Extension:CSS (A popular third party extension not used by Wikimedia), tries to sanitize whole CSS files via MW core's Sanitizer::checkCSS.
This function is meant to sanitize style attributes only. It is not meant to sanitize whole css files.
In particular, it does not prevent (Note the use of a string url, not a url function token, which is valid in CSS)
@import "https://example.com/mystyles.css"
which allows you to load an additional script, which does not get sanitized, thus bypassing all the sanitization routines. Without sanitization, at the very least you can leak IP addresses by loading third party images. You might be able to pull off a token extraction attack.
I'm not sure if blocking @import would fix the issue or not. I don't know if there are other @rules that are problematic. @charset at the least seems suspicious, although i am not sure if it is exploitable in practice.