{"vulnerability": "CVE-2025-32873", "sightings": [{"uuid": "ab81f29a-969c-4fa8-a6c6-cddda63e3d25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lq3rpp72u22f", "content": "", "creation_timestamp": "2025-05-26T18:14:34.539512Z"}, {"uuid": "3e910efa-1ff9-4075-beaa-946eecf7b0ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lryfps3q4s2i", "content": "", "creation_timestamp": "2025-06-19T20:52:15.838108Z"}, {"uuid": "ed6d9ad3-50c3-46f2-beb4-b89138afbe10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lolpyl7haf2g", "content": "", "creation_timestamp": "2025-05-07T15:35:54.545898Z"}, {"uuid": "5a0a1f59-61b7-4fe0-830b-a069eac9f9e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q2/108", "content": "", "creation_timestamp": "2025-05-07T13:06:40.000000Z"}, {"uuid": "be8bd7a2-7cbd-45db-8696-f7296a20f6ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lomzy7rtq3a2", "content": "", "creation_timestamp": "2025-05-08T04:18:32.592137Z"}, {"uuid": "71e00bcb-429c-4adf-a909-016547190e03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3looofxi7l22x", "content": "", "creation_timestamp": "2025-05-08T19:45:39.937895Z"}, {"uuid": "99d457b5-bbd2-4c0b-8860-1101b6610978", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lotglkysi22i", "content": "", "creation_timestamp": "2025-05-10T17:08:54.432210Z"}, {"uuid": "c93f22f1-d76c-43d3-9f2b-104edff9ea4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lowaslcrn227", "content": "", "creation_timestamp": "2025-05-11T20:03:27.471231Z"}, {"uuid": "d2d57e75-a250-424d-8673-fb5a41781656", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "seen", "source": "https://gist.github.com/EbonJaeger/c926e3af98a35b4e4b74385dfdc6e799", "content": "", "creation_timestamp": "2025-08-01T20:18:13.000000Z"}, {"uuid": "9c7e102a-bb12-4cad-8270-ea294c981bb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lvjlbxjmz42g", "content": "", "creation_timestamp": "2025-08-03T21:02:59.490381Z"}, {"uuid": "977e4a9c-6b60-4db3-b186-e056711f9b5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "seen", "source": "https://bsky.app/profile/o2cloud.bsky.social/post/3me4niaiey32j", "content": "", "creation_timestamp": "2026-02-05T14:55:18.620147Z"}, {"uuid": "693f11cf-f74b-4742-89a4-ac8a82f0b072", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15464", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32873\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)\n\ud83d\udd39 Description: An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags().\n\ud83d\udccf Published: 2025-05-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-08T04:05:04.028Z\n\ud83d\udd17 References:\n1. https://docs.djangoproject.com/en/dev/releases/security/\n2. https://groups.google.com/g/django-announce\n3. https://www.djangoproject.com/weblog/2025/may/07/security-releases/", "creation_timestamp": "2025-05-08T04:22:47.000000Z"}, {"uuid": "07682a3b-2544-43a0-8f0a-cd3a74ae96cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/39091", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2025\n\u63cf\u8ff0\uff1aDjango Security Issue (CVE-2025-32873)\nURL\uff1ahttps://github.com/Apollo-R3bot/django-vulnerability-CVE-2025-32873\n\n\u6807\u7b7e\uff1a#CVE-2025", "creation_timestamp": "2025-06-03T09:21:22.000000Z"}, {"uuid": "d95bd45e-18fe-4506-8a79-3f0d1a8d3139", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "published-proof-of-concept", "source": "Telegram/S3luyvJ2R7xCTSLpSlkUyEdAxTgE_nQEIWaJA9giiuBhhRI", "content": "", "creation_timestamp": "2025-06-03T15:00:07.000000Z"}, {"uuid": "b07406be-0d0b-46d8-a8be-8c54ed42dcbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32873", "type": "seen", "source": "https://t.me/cvedetector/24787", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32873 - Django Slow Denial-of-Service Vulnerability in HTML Tag Processing\", \n  \"Content\": \"CVE ID : CVE-2025-32873 \nPublished : May 8, 2025, 4:17 a.m. | 47\u00a0minutes ago \nDescription : An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags(). \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-08T07:33:59.000000Z"}]}