CVE-2025-32873
Publication date 7 May 2025
Last updated 14 May 2025
Ubuntu priority
An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags().
Status
Package | Ubuntu Release | Status |
---|---|---|
python-django | 25.04 plucky |
Fixed 3:4.2.18-1ubuntu1.1
|
24.10 oracular |
Fixed 3:4.2.15-1ubuntu1.4
|
|
24.04 LTS noble |
Fixed 3:4.2.11-1ubuntu1.7
|
|
22.04 LTS jammy |
Fixed 2:3.2.12-2ubuntu1.18
|
|
20.04 LTS focal |
Fixed 2:2.2.12-1ubuntu0.29
|
|
18.04 LTS bionic |
Fixed 1:1.11.11-1ubuntu1.21+esm11
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty |
Needs evaluation
|
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu ProReferences
Related Ubuntu Security Notices (USN)
- USN-7501-1
- Django vulnerability
- 7 May 2025
- USN-7501-2
- Django vulnerability
- 7 May 2025