First published: Thu Mar 06 2025(Updated: )
An issue was discovered in Django 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2.20. The django.utils.text.wrap() method and wordwrap template filter are subject to a potential denial-of-service attack when used with very long strings.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Django | <5.1.7 | |
Django | <5.0.13 | |
Django | <4.2.20 | |
pip/Django | >=5.1<5.1.7 | 5.1.7 |
pip/Django | >=5.0<5.0.13 | 5.0.13 |
pip/Django | >=4.2<4.2.20 | 4.2.20 |
debian/python-django | <=2:2.2.28-1~deb11u2<=2:2.2.28-1~deb11u5<=3:3.2.19-1+deb12u1 | 3:4.2.20-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-26699 has a moderate severity level due to its potential for denial-of-service attacks.
To fix CVE-2025-26699, upgrade Django to version 5.1.7, 5.0.13, or 4.2.20 or later.
CVE-2025-26699 affects Django versions 5.1 before 5.1.7, 5.0 before 5.0.13, and 4.2 before 4.2.20.
The potential impacts of CVE-2025-26699 include service disruptions caused by denial-of-service attacks exploiting long string inputs.
No specific workarounds have been provided for CVE-2025-26699, so upgrading to a patched version is recommended.