CVE-2026-1285
Potential denial-of-service vulnerability in django.utils.text.Truncator HTML methods
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. `django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
| CWE | CWE-407 |
| Vendor | djangoproject |
| Product | django |
| Published | Feb 3, 2026 |
| Last Updated | Feb 3, 2026 |
Stay Ahead of the Next One
Get instant alerts for djangoproject django
Be the first to know when new high vulnerabilities affecting djangoproject django are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
djangoproject / Django
6.0 < 6.0.2 5.2 < 5.2.11 4.2 < 4.2.28
References
Credits
๐ Seokchan Yoon Natalia Bidart Jacob Walls