Moderate severityNVD Advisory· Published Apr 11, 2011· Updated Apr 29, 2026
CVE-2009-5065
CVE-2009-5065
Description
Cross-site scripting (XSS) vulnerability in feedparser.py in Universal Feed Parser (aka feedparser or python-feedparser) before 5.0 allows remote attackers to inject arbitrary web script or HTML via vectors involving nested CDATA stanzas.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
feedparserPyPI | < 5.0 | 5.0 |
Affected products
9cpe:2.3:a:mark_pilgrim:feedparser:*:*:*:*:*:*:*:*+ 8 more
- cpe:2.3:a:mark_pilgrim:feedparser:*:*:*:*:*:*:*:*range: <=4.1
- cpe:2.3:a:mark_pilgrim:feedparser:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:mark_pilgrim:feedparser:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mark_pilgrim:feedparser:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:mark_pilgrim:feedparser:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:mark_pilgrim:feedparser:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:mark_pilgrim:feedparser:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:mark_pilgrim:feedparser:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mark_pilgrim:feedparser:4.0.2:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- code.google.com/p/feedparser/issues/detailnvdExploitPatchWEB
- bugzilla.novell.com/show_bug.cginvdExploitPatchWEB
- bugzilla.redhat.com/show_bug.cginvdExploitPatchWEB
- secunia.com/advisories/44074nvdVendor Advisory
- github.com/advisories/GHSA-3mwg-gp5g-fv3qghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2009-5065ghsaADVISORY
- lists.opensuse.org/opensuse-updates/2011-04/msg00026.htmlnvdWEB
- support.novell.com/security/cve/CVE-2009-5065.htmlnvdWEB
- github.com/pypa/advisory-database/tree/main/vulns/feedparser/PYSEC-2011-18.yamlghsaWEB
- web.archive.org/web/20200228153921/http://www.securityfocus.com/bid/47177ghsaWEB
- web.archive.org/web/20210329050642/http://www.mandriva.com/security/advisoriesghsaWEB
- www.mandriva.com/security/advisoriesnvd
- www.securityfocus.com/bid/47177nvd
News mentions
0No linked articles in our index yet.