-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the toColor class implementation in colors.py where eval() was directly used on input arguments. Multiple sources (CVE description, commit diff, and advisory links) show the vulnerable pattern 'eval(arg)' in color processing. The patch replaced eval() with rl_safe_eval() which implements safer evaluation. The XML injection occurs when user-controlled color attributes containing Python code are passed to this function.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| reportlab | pip | < 3.5.28 | 3.5.28 |
Ongoing coverage of React2Shell