CVE-2026-1285: Django has Inefficient Algorithmic Complexity
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
django.utils.text.Truncator.chars() and Truncator.words() methods (with html=True) and the truncatechars_html and truncatewords_html template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Seokchan Yoon for reporting this issue.
References
- docs.djangoproject.com/en/dev/releases/security
- github.com/advisories/GHSA-4rrr-2h4v-f3j9
- github.com/django/django
- github.com/django/django/commit/a33540b3e20b5d759aa8b2e4b9ca0e8edd285344
- groups.google.com/g/django-announce
- nvd.nist.gov/vuln/detail/CVE-2026-1285
- www.djangoproject.com/weblog/2026/feb/03/security-releases
Code Behaviors & Features
Detect and mitigate CVE-2026-1285 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →