Vulnerability Description
django-wiki is a wiki system for Django. Installations of django-wiki prior to version 0.10.1 are vulnerable to maliciously crafted article content that can cause severe use of server CPU through a regular expression loop. Version 0.10.1 fixes this issue. As a workaround, close off access to create and edit articles by anonymous users.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Django-Wiki Project | Django-Wiki | < 0.10.1 |
Related Weaknesses (CWE)
References
- https://github.com/django-wiki/django-wiki/commit/8e280fd6c0bd27ce847c67b2d216c6Patch
- https://github.com/django-wiki/django-wiki/security/advisories/GHSA-wj85-w4f4-xhVendor Advisory
- https://github.com/django-wiki/django-wiki/commit/8e280fd6c0bd27ce847c67b2d216c6Patch
- https://github.com/django-wiki/django-wiki/security/advisories/GHSA-wj85-w4f4-xhVendor Advisory
FAQ
What is CVE-2024-28865?
CVE-2024-28865 is a vulnerability with a CVSS score of 7.5 (HIGH). django-wiki is a wiki system for Django. Installations of django-wiki prior to version 0.10.1 are vulnerable to maliciously crafted article content that can cause severe use of server CPU through a re...
How severe is CVE-2024-28865?
CVE-2024-28865 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-28865?
Check the references section above for vendor advisories and patch information. Affected products include: Django-Wiki Project Django-Wiki.