bleach.clean behavior parsing style attributes could result in a regular expression denial of service (ReDoS). Calls to bleach.clean with an allowed tag with an allowed style attribute are vulnerable to ReDoS. For example, bleach.clean(..., attributes={'a': ['style']}).
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2167-1 | python-bleach security update |
![]() |
EUVD-2020-0056 | regular expression denial-of-service (ReDoS) in Bleach |
![]() |
GHSA-vqhp-cxgc-6wmm | regular expression denial-of-service (ReDoS) in Bleach |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 19 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: mozilla
Published:
Updated: 2025-03-19T15:21:23.888Z
Reserved: 2020-01-10T00:00:00.000Z
Link: CVE-2020-6817

Updated: 2024-08-04T09:11:05.144Z

Status : Modified
Published: 2023-02-16T22:15:10.650
Modified: 2025-03-19T16:15:14.917
Link: CVE-2020-6817

No data.

No data.