In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.
References
Configurations
Configuration 1 (hide)
|
History
04 Nov 2025, 19:17
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://docs.djangoproject.com/en/5.0/releases/security/ - Release Notes, Vendor Advisory |
Information
Published : 2024-03-15 20:15
Updated : 2025-11-04 19:17
NVD link : CVE-2024-27351
Mitre link : CVE-2024-27351
CVE.ORG link : CVE-2024-27351
JSON object : View
Products Affected
djangoproject
- django
CWE
CWE-1333
Inefficient Regular Expression Complexity
