Medium severity5.8GHSA Advisory· Published May 14, 2026· Updated May 15, 2026
CVE-2026-44312
CVE-2026-44312
Description
css_parser is a Ruby CSS parser. Prior to 2.1.0 and 1.22.0, the CSS Parser gem does not validate HTTPS connections, allowing a Man-in-the-Middle (MITM) attacker to inject or modify CSS content when stylesheets are loaded via HTTPS. The connection is established with OpenSSL::SSL::VERIFY_NONE, meaning any HTTPS certificate—even entirely untrusted—will be accepted without validation. This vulnerability is fixed in 2.1.0 and 1.22.0.
Affected products
1- Range: < 2.1.0
Patches
235e689c90422Merge pull request #186 from premailer/grosser/https
1 file changed · +0 −1
lib/css_parser/parser.rb+0 −1 modified@@ -643,7 +643,6 @@ def read_remote_file(uri) # :nodoc: uri.port = 443 unless uri.port http = Net::HTTP.new(uri.host, uri.port) http.use_ssl = true - http.verify_mode = OpenSSL::SSL::VERIFY_NONE else http = Net::HTTP.new(uri.host, uri.port) end
e0c95d5abe91Merge pull request #186 from premailer/grosser/https
1 file changed · +0 −1
lib/css_parser/parser.rb+0 −1 modified@@ -648,7 +648,6 @@ def read_remote_file(uri) # :nodoc: uri.port = 443 unless uri.port http = Net::HTTP.new(uri.host, uri.port) http.use_ssl = true - http.verify_mode = OpenSSL::SSL::VERIFY_NONE else http = Net::HTTP.new(uri.host, uri.port) end
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-ff6c-w6qf-7xqcghsaADVISORY
- github.com/premailer/css_parser/commit/35e689c904225add78e0c488cf04bad052666449nvd
- github.com/premailer/css_parser/commit/e0c95d5abe91b237becb90ff316531a6547ada18nvd
- github.com/premailer/css_parser/issues/185nvd
- github.com/premailer/css_parser/security/advisories/GHSA-ff6c-w6qf-7xqcnvd
- nvd.nist.gov/vuln/detail/CVE-2026-44312ghsa
News mentions
0No linked articles in our index yet.