PyPi: Wagtail

CVE-2024-39317

Safety vulnerability ID: 72127

This vulnerability was reviewed by experts

The information on this page was manually curated by our Cybersecurity Intelligence Team.

Created at Jul 11, 2024 Updated at Feb 21, 2025
Scan your Python projects for vulnerabilities →

Advisory

Wagtail addresses a regular expression denial-of-service (ReDoS) vulnerability in search query parsing. A bug in Wagtail's 'parse_query_string' would result in it taking a long time to process suitably crafted inputs. When used to parse sufficiently long strings of characters without a space, 'parse_query_string' would take an unexpectedly large amount of time to process, resulting in a denial of service. In an initial Wagtail installation, the vulnerability can be exploited by any Wagtail admin user. It cannot be exploited by end users. If your Wagtail site has a custom search implementation which uses 'parse_query_string', it may be exploitable by other users (e.g. unauthenticated users).

Affected package

wagtail

Latest version: 6.4.1

A Django content management system.

Affected versions

Fixed versions

Vulnerability changelog

~~~~~~~~~~~~~~~~~~

* Fix: CVE-2024-39317: Regular expression denial-of-service via search query parsing (Jake Howard)
* Fix: Fix image preview when Willow optimizers are enabled (Alex Tomkins)
* Maintenance: Remove django-pattern-library upper bound in testing dependencies (Sage Abdullah)

Resources

Use this package?

Scan your Python project for dependency vulnerabilities in two minutes

Scan your application

Severity Details

CVSS Base Score

MEDIUM 4.9

CVSS v3 Details

MEDIUM 4.9
Attack Vector (AV)
NETWORK
Attack Complexity (AC)
LOW
Privileges Required (PR)
HIGH
User Interaction (UI)
NONE
Scope (S)
UNCHANGED
Confidentiality Impact (C)
NONE
Integrity Impact (I)
NONE
Availability Availability (A)
HIGH