CVE-2024-27351

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-27351
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-27351.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-27351
Aliases
Downstream
Related
Published
2024-03-15T20:15:09Z
Modified
2025-10-09T06:38:33.954621Z
Summary
[none]
Details

In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.

References

Affected packages

Git / github.com/django/django

Affected ranges

Type
GIT
Repo
https://github.com/django/django
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Fixed

Affected versions

1.*

1.0
1.1
1.2
1.2.1
1.3
1.4
1.7a1
1.7a2

3.*

3.2
3.2.1
3.2.10
3.2.11
3.2.12
3.2.13
3.2.14
3.2.15
3.2.16
3.2.17
3.2.18
3.2.19
3.2.2
3.2.20
3.2.21
3.2.22
3.2.23
3.2.24
3.2.3
3.2.4
3.2.5
3.2.6
3.2.7
3.2.8
3.2.9
3.2a1
3.2b1
3.2rc1

4.*

4.2
4.2.1
4.2.10
4.2.2
4.2.3
4.2.4
4.2.5
4.2.6
4.2.7
4.2.8
4.2.9
4.2a1
4.2b1
4.2rc1

5.*

5.0
5.0.1
5.0.2
5.0a1
5.0b1
5.0rc1