This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-0103 This affects the package jinja2 from 0.0.0 and before 2.11.3. The ReDoS vulnerability is mainly due to the `_punctuation_re regex` operator and its use of multiple wildcards. The last wildcard is the most exploitable as it searches for trailing punctuation. This issue can be mitigated by Markdown to format user content instead of the urlize filter, or by implementing request timeouts and limiting process memory.
Github GHSA Github GHSA GHSA-g3rq-g295-4j3m Regular Expression Denial of Service (ReDoS) in Jinja2
Ubuntu USN Ubuntu USN USN-5701-1 Jinja2 vulnerability
Ubuntu USN Ubuntu USN USN-6599-1 Jinja2 vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00212}

epss

{'score': 0.00207}


Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00207}

epss

{'score': 0.00212}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-16T17:24:01.606Z

Reserved: 2020-11-12T00:00:00

Link: CVE-2020-28493

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-01T20:15:12.517

Modified: 2024-11-21T05:22:54.013

Link: CVE-2020-28493

cve-icon Redhat

Severity : Moderate

Publid Date: 2021-02-01T00:00:00Z

Links: CVE-2020-28493 - Bugzilla

cve-icon OpenCVE Enrichment

No data.