An issue was discovered in Django 2.0 before 2.0.3, 1.11 before 1.11.11, and 1.8 before 1.8.19. The django.utils.html.urlize() function was extremely slow to evaluate certain inputs due to catastrophic backtracking vulnerabilities in two regular expressions (only one regular expression for Django 1.8.x). The urlize() function is used to implement the urlize and urlizetrunc template filters, which were thus vulnerable.
Cite this page
CVE-2018-7536. CVEDatabase.com. Retrieved 1 May 2026. https://cvedatabase.com/cve/CVE-2018-7536
Use CWE-185, Canonical vendor hub and Ubuntu Linux product page to widen CVE-2018-7536 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2025-32463, CVE-2022-1736 and CVE-2025-33208 for nearby disclosures in the same product family.