{"id":"CVE-2025-32873","details":"An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags().","aliases":["BIT-django-2025-32873","GHSA-8j24-cjrq-gr2m","PYSEC-2025-37"],"modified":"2026-04-16T00:06:13.350623470Z","published":"2025-05-08T04:17:18.157Z","related":["CGA-938w-cm65-cj6c","SUSE-SU-2025:01523-1","SUSE-SU-2025:1523-1","openSUSE-SU-2025:15082-1","openSUSE-SU-2025:15087-1","openSUSE-SU-2026:10005-1"],"references":[{"type":"ADVISORY","url":"https://docs.djangoproject.com/en/dev/releases/security/"},{"type":"ADVISORY","url":"https://www.djangoproject.com/weblog/2025/may/07/security-releases/"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2025/05/07/1"},{"type":"ARTICLE","url":"https://groups.google.com/g/django-announce"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2025/05/07/1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/django/django","events":[{"introduced":"0"},{"fixed":"87175d270aec969d3cad4bad1abf45e07302d795"},{"introduced":"84d09a547fe35e10018ab242602ca76c29ca91a1"},{"fixed":"db5c8a97bb084cee880e678681d63bddecf6d38b"}]}],"versions":["stable/5.1.x"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-32873.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}