Safety vulnerability ID: 72127
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Wagtail addresses a regular expression denial-of-service (ReDoS) vulnerability in search query parsing. A bug in Wagtail's 'parse_query_string' would result in it taking a long time to process suitably crafted inputs. When used to parse sufficiently long strings of characters without a space, 'parse_query_string' would take an unexpectedly large amount of time to process, resulting in a denial of service. In an initial Wagtail installation, the vulnerability can be exploited by any Wagtail admin user. It cannot be exploited by end users. If your Wagtail site has a custom search implementation which uses 'parse_query_string', it may be exploitable by other users (e.g. unauthenticated users).
Latest version: 6.4.1
A Django content management system.
~~~~~~~~~~~~~~~~~~
* Fix: CVE-2024-39317: Regular expression denial-of-service via search query parsing (Jake Howard)
* Fix: Fix image preview when Willow optimizers are enabled (Alex Tomkins)
* Maintenance: Remove django-pattern-library upper bound in testing dependencies (Sage Abdullah)
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application