{"id":"CVE-2024-39317","summary":"Wagtail regular expression denial-of-service via search query parsing","details":"Wagtail is an open source content management system built on Django. A bug in Wagtail's `parse_query_string` would result in it taking a long time to process suitably crafted inputs. When used to parse sufficiently long strings of characters without a space, `parse_query_string` would take an unexpectedly large amount of time to process, resulting in a denial of service. In an initial Wagtail installation, the vulnerability can be exploited by any Wagtail admin user. It cannot be exploited by end users. If your Wagtail site has a custom search implementation which uses `parse_query_string`, it may be exploitable by other users (e.g. unauthenticated users). Patched versions have been released as Wagtail 5.2.6, 6.0.6 and 6.1.3.\n","aliases":["GHSA-jmp3-39vp-fwg8","PYSEC-2024-86"],"modified":"2026-04-10T05:13:34.863372Z","published":"2024-07-11T15:23:22.307Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/39xxx/CVE-2024-39317.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-1333"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/39xxx/CVE-2024-39317.json"},{"type":"ADVISORY","url":"https://github.com/wagtail/wagtail/security/advisories/GHSA-jmp3-39vp-fwg8"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39317"},{"type":"FIX","url":"https://github.com/wagtail/wagtail/commit/31b1e8532dfb1b70d8d37d22aff9cbde9109cdf2"},{"type":"FIX","url":"https://github.com/wagtail/wagtail/commit/3c941136f79c48446e3858df46e5b668d7f83797"},{"type":"FIX","url":"https://github.com/wagtail/wagtail/commit/b783c096b6d4fd2cfc05f9137a0be288850e99a2"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/wagtail/wagtail","events":[{"introduced":"c612b01e3ad77724808da2659acdecb5555b82ff"},{"fixed":"3ee28ee8b2554232a8854035277d442e46975b0c"}],"database_specific":{"versions":[{"introduced":"2.0"},{"fixed":"5.2.6"}]}},{"type":"GIT","repo":"https://github.com/wagtail/wagtail","events":[{"introduced":"44f438fc1f56cd1d7855cf3815bb5e3bf0554bc2"},{"fixed":"24fb4064e5b71d0ec6fd2d354df07718841e1ad5"}],"database_specific":{"versions":[{"introduced":"6.0"},{"fixed":"6.0.6"}]}},{"type":"GIT","repo":"https://github.com/wagtail/wagtail","events":[{"introduced":"fc4d2d0e735ae5f99162683efbd33ab35dd7f8e5"},{"fixed":"7af87e08b9d1924a89db449a24d5426c7e65ecac"}],"database_specific":{"versions":[{"introduced":"6.1"},{"fixed":"6.1.3"}]}}],"versions":["v6.0","v6.0.1","v6.0.2","v6.0.3","v6.0.4","v6.0.5","v6.1","v6.1.1","v6.1.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-39317.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"}]}