In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Django | Djangoproject | 3.2 (including) | 3.2.25 (excluding) | 
| Django | Djangoproject | 4.2 (including) | 4.2.11 (excluding) | 
| Django | Djangoproject | 5.0 (including) | 5.0.3 (excluding) | 
| Red Hat Ansible Automation Platform 2.4 for RHEL 8 | RedHat | python3x-django-0:4.2.11-1.el8ap | * | 
| Red Hat Ansible Automation Platform 2.4 for RHEL 8 | RedHat | automation-controller-0:4.5.7-1.el8ap | * | 
| Red Hat Ansible Automation Platform 2.4 for RHEL 9 | RedHat | python-django-0:4.2.11-1.el9ap | * | 
| Red Hat Ansible Automation Platform 2.4 for RHEL 9 | RedHat | automation-controller-0:4.5.7-1.el9ap | * | 
| Red Hat OpenStack Platform 17.1 for RHEL 9 | RedHat | python-django-0:2.2.24-9.el9ost | * | 
| Red Hat Satellite 6.15 for RHEL 8 | RedHat | python-django-0:4.2.14-1.el8pc | * | 
| Red Hat Satellite 6.15 for RHEL 8 | RedHat | python-django-0:4.2.14-1.el8pc | * | 
| RHUI 4 for RHEL 8 | RedHat | python-django-0:4.2.11-1.el8ui | * | 
| Python-django | Ubuntu | bionic | * | 
| Python-django | Ubuntu | devel | * | 
| Python-django | Ubuntu | esm-infra/bionic | * | 
| Python-django | Ubuntu | esm-infra/focal | * | 
| Python-django | Ubuntu | focal | * | 
| Python-django | Ubuntu | jammy | * | 
| Python-django | Ubuntu | mantic | * | 
| Python-django | Ubuntu | noble | * | 
| Python-django | Ubuntu | oracular | * | 
| Python-django | Ubuntu | plucky | * | 
| Python-django | Ubuntu | questing | * | 
| Python-django | Ubuntu | trusty | * | 
| Python-django | Ubuntu | trusty/esm | * | 
| Python-django | Ubuntu | upstream | * | 
| Python-django | Ubuntu | xenial | * | 
	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.