Python/django/2.2.26
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
https://pypi.org/project/django
BSD
4 Security Vulnerabilities
Infinite Loop in Django
- https://nvd.nist.gov/vuln/detail/CVE-2022-23833
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://www.djangoproject.com/weblog/2022/feb/01/security-releases/
- https://github.com/advisories/GHSA-6cw3-g6wv-c2xv
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
- https://security.netapp.com/advisory/ntap-20220221-0003/
- https://www.debian.org/security/2022/dsa-5254
- https://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a
- https://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468
An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.
Cross-site Scripting in Django
- https://nvd.nist.gov/vuln/detail/CVE-2022-22818
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://www.djangoproject.com/weblog/2022/feb/01/security-releases/
- https://github.com/advisories/GHSA-95rw-fx8r-36v6
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
- https://security.netapp.com/advisory/ntap-20220221-0003/
- https://www.debian.org/security/2022/dsa-5254
- https://github.com/django/django/commit/01422046065d2b51f8f613409cad2c81b39487e5
- https://github.com/django/django/commit/1a1e8278c46418bde24c86a65443b0674bae65e2
- https://github.com/django/django/commit/c27a7eb9f40b64990398978152e62b6ff839c2e6
- https://docs.djangoproject.com/en/4.0/releases/security
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV
- https://security.netapp.com/advisory/ntap-20220221-0003
- https://www.djangoproject.com/weblog/2022/feb/01/security-releases
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2022-19.yaml
The {% debug %} template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.
Django vulnerable to SQL injection via _connector keyword argument in QuerySet and Q objects.
- https://nvd.nist.gov/vuln/detail/CVE-2025-64459
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2025/nov/05/security-releases
- https://github.com/django/django/commit/06dd38324ac3d60d83d9f3adabf0dcdf423d2a85
- https://github.com/django/django/commit/59ae82e67053d281ff4562a24bbba21299f0a7d4
- https://github.com/django/django/commit/6703f364d767e949c5b0e4016433ef75063b4f9b
- https://github.com/django/django/commit/72d2c87431f2ae0431d65d0ec792047f078c8241
- https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-64459.html
- https://github.com/advisories/GHSA-frmv-pr5f-9mcr
- https://github.com/omarkurt/django-connector-CVE-2025-64459-testbed
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The methods QuerySet.filter(), QuerySet.exclude(), and QuerySet.get(), and the class Q(), are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the _connector argument. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank cyberstan for reporting this issue.
Django has a denial-of-service vulnerability in HttpResponseRedirect and HttpResponsePermanentRedirect on Windows
- https://nvd.nist.gov/vuln/detail/CVE-2025-64458
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2025/nov/05/security-releases
- https://github.com/django/django/commit/3790593781d26168e7306b5b2f8ea0309de16242
- https://github.com/django/django/commit/4f5d904b63751dea9ffc3b0e046404a7fa5881ac
- https://github.com/django/django/commit/6e13348436fccf8f22982921d6a3a3e65c956a9f
- https://github.com/django/django/commit/770eea38d7a0e9ba9455140b5a9a9e33618226a7
- https://github.com/advisories/GHSA-qw25-v68c-qjf3
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. NFKC normalization in Python is slow on Windows. As a consequence, django.http.HttpResponseRedirect, django.http.HttpResponsePermanentRedirect, and the shortcut django.shortcuts.redirect were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
418 Other Versions
| Version | License | Security | Released | |
|---|---|---|---|---|
| 6.0 | UNKNOWN | |||
| 5.2.9 | UNKNOWN | |||
| 5.2.8 | UNKNOWN | |||
| 5.2.7 | BSD-3-Clause AND BSD | 2 | ||
| 5.2.6 | BSD-3-Clause AND BSD | 4 | ||
| 5.2.5 | BSD-3-Clause AND BSD | 4 | ||
| 5.2.4 | BSD-3-Clause AND BSD | 4 | ||
| 5.2.3 | BSD-3-Clause AND BSD | 4 | ||
| 5.2.2 | BSD-3-Clause AND BSD | 4 | ||
| 5.2.1 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.2 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.15 | UNKNOWN | |||
| 5.1.14 | UNKNOWN | |||
| 5.1.13 | BSD-3-Clause AND BSD | 2 | ||
| 5.1.12 | BSD-3-Clause AND BSD | 4 | ||
| 5.1.11 | BSD-3-Clause AND BSD | 4 | ||
| 5.1.10 | BSD-3-Clause AND BSD | 4 | ||
| 5.1.9 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.8 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.7 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.6 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.5 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.4 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.3 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.2 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.1 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.14 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.13 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.12 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.11 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.10 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.9 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.8 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.7 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.6 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.5 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.4 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.3 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.2 | BSD-3-Clause AND BSD | 5 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.1 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.27 | BSD-3-Clause AND BSD | |||
| 4.2.26 | BSD-3-Clause AND BSD | |||
| 4.2.25 | BSD-3-Clause AND BSD | 2 | ||
| 4.2.24 | BSD-3-Clause AND BSD | 4 | ||
| 4.2.23 | BSD-3-Clause AND BSD | 4 | ||
| 4.2.22 | BSD-3-Clause AND BSD | 4 | ||
| 4.2.21 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.20 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
