← Retour aux CVEs
CVE-2026-1285
HIGH7.5
Description
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
Details CVE
Score CVSS v3.17.5
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie2/3/2026
Derniere modification2/4/2026
Sourcenvd
Observations honeypot0
Produits affectes
djangoproject:django
Faiblesses (CWE)
CWE-407
References
https://docs.djangoproject.com/en/dev/releases/security/(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)
https://groups.google.com/g/django-announce(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)
https://www.djangoproject.com/weblog/2026/feb/03/security-releases/(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.