CVE-2024-27351

In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.
References
Link Resource
http://www.openwall.com/lists/oss-security/2024/03/04/1 Mailing List
https://docs.djangoproject.com/en/5.0/releases/security/ Vendor Advisory Release Notes
https://groups.google.com/forum/#%21forum/django-announce Permissions Required
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/ Broken Link
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/ Broken Link
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/ Broken Link
https://www.djangoproject.com/weblog/2024/mar/04/security-releases/ Vendor Advisory
http://www.openwall.com/lists/oss-security/2024/03/04/1 Mailing List
https://docs.djangoproject.com/en/5.0/releases/security/ Vendor Advisory Release Notes
https://github.com/django/django/commit/072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521 Patch
https://github.com/django/django/commit/3394fc6132436eca89e997083bae9985fb7e761e Patch
https://github.com/django/django/commit/3c9a2771cc80821e041b16eb36c1c37af5349d4a Patch
https://groups.google.com/forum/#%21forum/django-announce Permissions Required
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/ Broken Link
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/ Broken Link
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/ Broken Link
https://www.djangoproject.com/weblog/2024/mar/04/security-releases/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*

History

10 Oct 2025, 15:13

Type Values Removed Values Added
First Time Djangoproject django
Djangoproject
CPE cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
References () http://www.openwall.com/lists/oss-security/2024/03/04/1 - () http://www.openwall.com/lists/oss-security/2024/03/04/1 - Mailing List
References () https://docs.djangoproject.com/en/5.0/releases/security/ - () https://docs.djangoproject.com/en/5.0/releases/security/ - Vendor Advisory, Release Notes
References () https://groups.google.com/forum/#%21forum/django-announce - () https://groups.google.com/forum/#%21forum/django-announce - Permissions Required
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX/ - Broken Link
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6/ - Broken Link
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D/ - Broken Link
References () https://www.djangoproject.com/weblog/2024/mar/04/security-releases/ - () https://www.djangoproject.com/weblog/2024/mar/04/security-releases/ - Vendor Advisory
References () https://github.com/django/django/commit/072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521 - () https://github.com/django/django/commit/072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521 - Patch
References () https://github.com/django/django/commit/3394fc6132436eca89e997083bae9985fb7e761e - () https://github.com/django/django/commit/3394fc6132436eca89e997083bae9985fb7e761e - Patch
References () https://github.com/django/django/commit/3c9a2771cc80821e041b16eb36c1c37af5349d4a - () https://github.com/django/django/commit/3c9a2771cc80821e041b16eb36c1c37af5349d4a - Patch

Information

Published : 2024-03-15 20:15

Updated : 2025-10-10 15:13


NVD link : CVE-2024-27351

Mitre link : CVE-2024-27351

CVE.ORG link : CVE-2024-27351


JSON object : View

Products Affected

djangoproject

  • django
CWE
CWE-1333

Inefficient Regular Expression Complexity