{"id":"CVE-2024-38875","details":"An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urlizetrunc were subject to a potential denial of service attack via certain inputs with a very large number of brackets.","aliases":["BIT-django-2024-38875","GHSA-qg2p-9jwr-mmqf","PYSEC-2024-56"],"modified":"2026-04-16T04:35:02.102234438Z","published":"2024-07-10T05:15:12.020Z","related":["CGA-wwxf-pjfq-2x2g","SUSE-SU-2024:2545-1","SUSE-SU-2024:2577-1","openSUSE-SU-2024:0251-1","openSUSE-SU-2024:14203-1","openSUSE-SU-2024:14208-1","openSUSE-SU-2026:10005-1"],"references":[{"type":"ADVISORY","url":"https://docs.djangoproject.com/en/dev/releases/security/"},{"type":"ADVISORY","url":"https://www.djangoproject.com/weblog/2024/jul/09/security-releases/"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240808-0005/"},{"type":"REPORT","url":"https://groups.google.com/forum/#%21forum/django-announce"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/django/django","events":[{"introduced":"879e5d587b84e6fc961829611999431778eb9f6a"},{"fixed":"98cf264c9cb0561e4ec305a621e9d58116e44aef"},{"introduced":"52821001bb62b764d73e63812133f199b8fef9eb"},{"fixed":"deec9b933ee8496274e4c53217a38f31cb59a27f"}],"database_specific":{"versions":[{"introduced":"4.2"},{"fixed":"4.2.14"},{"introduced":"5.0"},{"fixed":"5.0.7"}]}}],"versions":["4.2","4.2.1","4.2.10","4.2.11","4.2.12","4.2.13","4.2.2","4.2.3","4.2.4","4.2.5","4.2.6","4.2.7","4.2.8","4.2.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-38875.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}