First published: Thu May 08 2025(Updated: )
An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags().
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Django | >=5.2<5.2.1 | 5.2.1 |
pip/Django | >=5.1<5.1.9 | 5.1.9 |
pip/Django | >=4.2<4.2.21 | 4.2.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of GHSA-8j24-cjrq-gr2m is classified as a potential denial-of-service vulnerability due to slow performance when handling large sequences of incomplete HTML tags.
GHSA-8j24-cjrq-gr2m affects Django versions prior to 4.2.21, 5.1.9, and 5.2.1.
To fix GHSA-8j24-cjrq-gr2m, upgrade Django to version 4.2.21, 5.1.9, or 5.2.1.
The django.utils.html.strip_tags() function is vulnerable in GHSA-8j24-cjrq-gr2m.
The impact of GHSA-8j24-cjrq-gr2m can lead to degraded performance in web applications that process input with large sequences of incomplete HTML tags.