View all vulnerabilities

CVE-2024-27351

Regular expression denial-of-service in Django

In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
5.2
Score Vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
Affected Versions
django >= 3.2 < 3.2.25; django >= 4.2 < 4.2.11; django >= 5.0 < 5.0.3
Severity
Medium
Ecosystem
Python
Publish Date
March 15, 2024
Modified Date
February 12, 2025