In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.

Subscriptions

Vendors Products
Djangoproject Subscribe
Ansible Automation Platform Subscribe
Openstack Subscribe
Satellite Subscribe
Satellite Capsule Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4210-1 python-django security update
Debian DSA Debian DSA DSA-6136-1 python-django security update
Github GHSA Github GHSA GHSA-vm8q-m57g-pff3 Regular expression denial-of-service in Django
Ubuntu USN Ubuntu USN USN-6674-1 Django vulnerability
Ubuntu USN Ubuntu USN USN-6674-2 Django vulnerability
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 19:30:00 +0000


Tue, 04 Nov 2025 18:30:00 +0000


Fri, 10 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Djangoproject
Djangoproject django
CPEs cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
Vendors & Products Djangoproject
Djangoproject django

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00802}

epss

{'score': 0.00824}


Fri, 25 Apr 2025 03:30:00 +0000

Type Values Removed Values Added
First Time appeared Redhat openstack
CPEs cpe:/a:redhat:openstack:17.1::el9
Vendors & Products Redhat openstack

Wed, 21 Aug 2024 06:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat satellite
Redhat satellite Capsule
CPEs cpe:/a:redhat:satellite:6.15::el8
cpe:/a:redhat:satellite_capsule:6.15::el8
Vendors & Products Redhat satellite
Redhat satellite Capsule

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-04T18:30:07.884Z

Reserved: 2024-02-25T00:00:00.000Z

Link: CVE-2024-27351

cve-icon Vulnrichment

Updated: 2024-07-31T20:17:02.319Z

cve-icon NVD

Status : Modified

Published: 2024-03-15T20:15:09.303

Modified: 2025-11-04T19:17:03.553

Link: CVE-2024-27351

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-03-04T09:00:00Z

Links: CVE-2024-27351 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses