{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T04:54:23.959","vulnerabilities":[{"cve":{"id":"CVE-2024-39317","sourceIdentifier":"security-advisories@github.com","published":"2024-07-11T16:15:02.477","lastModified":"2026-03-20T18:34:00.577","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Wagtail is an open source content management system built on Django. A bug in Wagtail's `parse_query_string` would result in it taking a long time to process suitably crafted inputs. When used to parse sufficiently long strings of characters without a space, `parse_query_string` would take an unexpectedly large amount of time to process, resulting in a denial of service. In an initial Wagtail installation, the vulnerability can be exploited by any Wagtail admin user. It cannot be exploited by end users. If your Wagtail site has a custom search implementation which uses `parse_query_string`, it may be exploitable by other users (e.g. unauthenticated users). Patched versions have been released as Wagtail 5.2.6, 6.0.6 and 6.1.3.\n"},{"lang":"es","value":"Wagtail es un sistema de gestión de contenidos de código abierto construido sobre Django. Un error en `parse_query_string` de Wagtail provocaría que se tardara mucho en procesar las entradas adecuadamente manipuladas. Cuando se utiliza para analizar cadenas de caracteres suficientemente largas sin espacios, `parse_query_string` tardaría una cantidad de tiempo inesperadamente grande en procesarse, lo que provocaría una denegación de servicio. En una instalación inicial de Wagtail, cualquier usuario administrador de Wagtail puede aprovechar la vulnerabilidad. No puede ser explotado por los usuarios finales. Si su sitio Wagtail tiene una implementación de búsqueda personalizada que utiliza `parse_query_string`, otros usuarios pueden explotarla (por ejemplo, usuarios no autenticados). Se han lanzado versiones parcheadas como Wagtail 5.2.6, 6.0.6 y 6.1.3."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","baseScore":4.9,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1333"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-1333"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:torchbox:wagtail:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0","versionEndExcluding":"5.2.6","matchCriteriaId":"04E2B167-B135-4E11-9698-231D7F8E5C56"},{"vulnerable":true,"criteria":"cpe:2.3:a:torchbox:wagtail:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0","versionEndExcluding":"6.0.6","matchCriteriaId":"B5C9D288-39EC-45CE-9E0D-176A6F0285B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:torchbox:wagtail:*:*:*:*:*:*:*:*","versionStartIncluding":"6.1","versionEndExcluding":"6.1.3","matchCriteriaId":"B336D1C4-3530-4F3F-BE93-A669484230D0"}]}]}],"references":[{"url":"https://github.com/wagtail/wagtail/commit/31b1e8532dfb1b70d8d37d22aff9cbde9109cdf2","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/wagtail/wagtail/commit/3c941136f79c48446e3858df46e5b668d7f83797","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/wagtail/wagtail/commit/b783c096b6d4fd2cfc05f9137a0be288850e99a2","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/wagtail/wagtail/security/advisories/GHSA-jmp3-39vp-fwg8","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/wagtail/wagtail/commit/31b1e8532dfb1b70d8d37d22aff9cbde9109cdf2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/wagtail/wagtail/commit/3c941136f79c48446e3858df46e5b668d7f83797","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/wagtail/wagtail/commit/b783c096b6d4fd2cfc05f9137a0be288850e99a2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://github.com/wagtail/wagtail/security/advisories/GHSA-jmp3-39vp-fwg8","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}