Presumably because if you already allow script injection, style modification is the least of your problems.
Style elements and attributes are blocked to protect against malicious involvement, which can be done without JS. If someone modifies the HOUSE itself (and not just the presentation), this is much more serious.
The second link you give is not related to this; the demo is no longer working, but apparently, what he was doing was a link to the link page, as if it were a stylesheet, and the fact that some valid css was installed on the link page in two places intermediate text as image URL. CSP is not related there, because the attack is from a different direction; The link striker will intentionally be configured to load external stylesheets. (I donβt think that the CSP header can be set in the HTTP response for the css file itself - or another file that is processed as CSS - to prevent external binding to it, although I could be wrong.)
source share