Python/django/3.0.2
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
https://pypi.org/project/django
BSD
9 Security Vulnerabilities
XSS in Django
- https://nvd.nist.gov/vuln/detail/CVE-2020-13596
- https://github.com/advisories/GHSA-2m34-jcjv-45xf
- https://docs.djangoproject.com/en/3.0/releases/security/
- https://groups.google.com/forum/#!msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ
- https://www.djangoproject.com/weblog/2020/jun/03/security-releases/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
- https://security.netapp.com/advisory/ntap-20200611-0002/
- https://usn.ubuntu.com/4381-1/
- https://usn.ubuntu.com/4381-2/
- https://www.debian.org/security/2020/dsa-4705
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38
- https://github.com/django/django/commit/6d61860b22875f358fac83d903dc629897934815
- https://docs.djangoproject.com/en/3.0/releases/security
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ
- https://security.netapp.com/advisory/ntap-20200611-0002
- https://usn.ubuntu.com/4381-1
- https://usn.ubuntu.com/4381-2
- https://www.djangoproject.com/weblog/2020/jun/03/security-releases
An issue was discovered in Django version 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
SQL injection in Django
- https://nvd.nist.gov/vuln/detail/CVE-2020-9402
- https://github.com/advisories/GHSA-3gh2-xw74-jmcw
- https://docs.djangoproject.com/en/3.0/releases/security/
- https://groups.google.com/forum/#!topic/django-announce/fLUh_pOaKrY
- https://usn.ubuntu.com/4296-1/
- https://www.djangoproject.com/weblog/2020/mar/04/security-releases/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
- https://security.gentoo.org/glsa/202004-17
- https://security.netapp.com/advisory/ntap-20200327-0004/
- https://www.debian.org/security/2020/dsa-4705
- https://lists.debian.org/debian-lts-announce/2022/05/msg00035.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY/
- https://github.com/django/django/commit/6695d29b1c1ce979725816295a26ecc64ae0e927
- https://docs.djangoproject.com/en/3.0/releases/security
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UZMN2NKAGTFE3YKMNM2JVJG7R2W7LLHY
- https://security.netapp.com/advisory/ntap-20200327-0004
- https://usn.ubuntu.com/4296-1
- https://www.djangoproject.com/weblog/2020/mar/04/security-releases
Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.
Django Incorrect Default Permissions
- https://nvd.nist.gov/vuln/detail/CVE-2020-24584
- https://github.com/advisories/GHSA-fr28-569j-53c4
- https://github.com/django/django/commit/1853724acaf17ed7414d54c7d2b5563a25025a71
- https://docs.djangoproject.com/en/dev/releases/security/
- https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM
- https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/
- https://security.netapp.com/advisory/ntap-20200918-0004/
- https://usn.ubuntu.com/4479-1/
- https://www.djangoproject.com/weblog/2020/sep/01/security-releases/
- https://www.openwall.com/lists/oss-security/2020/09/01/2
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://github.com/django/django/commit/2b099caa5923afa8cfb5f1e8c0d56b6e0e81915b
- https://github.com/django/django/commit/a3aebfdc8153dc230686b6d2454ccd32ed4c9e6f
- https://github.com/django/django/commit/cdb367c92a0ba72ddc0cbd13ff42b0e6df709554
- https://docs.djangoproject.com/en/dev/releases/security
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI
- https://security.netapp.com/advisory/ntap-20200918-0004
- https://usn.ubuntu.com/4479-1
- https://www.djangoproject.com/weblog/2020/sep/01/security-releases
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2020-34.yaml
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). The intermediate-level directories of the filesystem cache had the system's standard umask rather than 0o077.
Django vulnerable to SQL injection via _connector keyword argument in QuerySet and Q objects.
- https://nvd.nist.gov/vuln/detail/CVE-2025-64459
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2025/nov/05/security-releases
- https://github.com/django/django/commit/06dd38324ac3d60d83d9f3adabf0dcdf423d2a85
- https://github.com/django/django/commit/59ae82e67053d281ff4562a24bbba21299f0a7d4
- https://github.com/django/django/commit/6703f364d767e949c5b0e4016433ef75063b4f9b
- https://github.com/django/django/commit/72d2c87431f2ae0431d65d0ec792047f078c8241
- https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-64459.html
- https://github.com/advisories/GHSA-frmv-pr5f-9mcr
- https://github.com/omarkurt/django-connector-CVE-2025-64459-testbed
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The methods QuerySet.filter(), QuerySet.exclude(), and QuerySet.get(), and the class Q(), are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the _connector argument. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank cyberstan for reporting this issue.
Django Directory Traversal via archive.extract
- https://nvd.nist.gov/vuln/detail/CVE-2021-3281
- https://github.com/advisories/GHSA-fvgf-6h6h-3322
- https://github.com/django/django/commit/05413afa8c18cdb978fcdf470e09f7a12b234a23
- https://docs.djangoproject.com/en/3.1/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO/
- https://security.netapp.com/advisory/ntap-20210226-0004/
- https://www.djangoproject.com/weblog/2021/feb/01/security-releases/
- https://docs.djangoproject.com/en/3.1/releases/3.0.12/
- https://github.com/django/django/commit/02e6592835b4559909aa3aaaf67988fef435f624
- https://github.com/django/django/commit/21e7622dec1f8612c85c2fc37fe8efbfd3311e37
- https://github.com/django/django/commit/52e409ed17287e9aabda847b6afe58be2fa9f86a
- https://docs.djangoproject.com/en/3.1/releases/3.0.12
- https://docs.djangoproject.com/en/3.1/releases/security
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-9.yaml
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YF52FKEH5S2P5CM4X7IXSYG67YY2CDOO
- https://security.netapp.com/advisory/ntap-20210226-0004
- https://www.djangoproject.com/weblog/2021/feb/01/security-releases
In Django 2.2 before 2.2.18, 3.0 before 3.0.12, and 3.1 before 3.1.6, the django.utils.archive.extract method (used by startapp --template
and startproject --template
) allows directory traversal via an archive with absolute paths or relative paths with dot segments.
Django Incorrect Default Permissions
- https://nvd.nist.gov/vuln/detail/CVE-2020-24583
- https://github.com/advisories/GHSA-m6gj-h9gm-gw44
- https://github.com/django/django/commit/8d7271578d7b153435b40fe40236ebec43cbf1b9
- https://docs.djangoproject.com/en/dev/releases/security/
- https://groups.google.com/forum/#!topic/django-announce/Gdqn58RqIDM
- https://groups.google.com/forum/#!topic/django-announce/zFCMdgUnutU
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F2ZHO3GZCJMP3DDTXCNVFV6ED3W64NAU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OLGFFLMF3X6USMJD7V5F5P4K2WVUTO3T/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZCRPQCBTV3RZHKVZ6K6QOAANPRZQD3GI/
- https://security.netapp.com/advisory/ntap-20200918-0004/
- https://usn.ubuntu.com/4479-1/
- https://www.djangoproject.com/weblog/2020/sep/01/security-releases/
- https://www.openwall.com/lists/oss-security/2020/09/01/2
- https://www.oracle.com/security-alerts/cpujan2021.html
An issue was discovered in Django 2.2 before 2.2.16, 3.0 before 3.0.10, and 3.1 before 3.1.1 (when Python 3.7+ is used). FILEUPLOADDIRECTORY_PERMISSIONS mode was not applied to intermediate-level directories created in the process of uploading files. It was also not applied to intermediate-level collected static directories when using the collectstatic management command.
Django Access Control Bypass possibly leading to SSRF, RFI, and LFI attacks
- https://nvd.nist.gov/vuln/detail/CVE-2021-33571
- https://github.com/advisories/GHSA-p99v-5w3c-jqq9
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo
- https://www.djangoproject.com/weblog/2021/jun/02/security-releases/
- https://security.netapp.com/advisory/ntap-20210727-0004/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
- https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e
- https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d
- https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/B4SQG2EAF4WCI2SLRL6XRDJ3RPK3ZRDV/
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validateipv4address, and validateipv46address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validateipv4address and validateipv46address are unaffected with Python 3.9.5+..) .
Django has a denial-of-service vulnerability in HttpResponseRedirect and HttpResponsePermanentRedirect on Windows
- https://nvd.nist.gov/vuln/detail/CVE-2025-64458
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2025/nov/05/security-releases
- https://github.com/django/django/commit/3790593781d26168e7306b5b2f8ea0309de16242
- https://github.com/django/django/commit/4f5d904b63751dea9ffc3b0e046404a7fa5881ac
- https://github.com/django/django/commit/6e13348436fccf8f22982921d6a3a3e65c956a9f
- https://github.com/django/django/commit/770eea38d7a0e9ba9455140b5a9a9e33618226a7
- https://github.com/advisories/GHSA-qw25-v68c-qjf3
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. NFKC normalization in Python is slow on Windows. As a consequence, django.http.HttpResponseRedirect, django.http.HttpResponsePermanentRedirect, and the shortcut django.shortcuts.redirect were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
Data leakage via cache key collision in Django
- https://nvd.nist.gov/vuln/detail/CVE-2020-13254
- https://github.com/advisories/GHSA-wpjr-j57x-wxfw
- https://docs.djangoproject.com/en/3.0/releases/security/
- https://groups.google.com/d/msg/django-announce/pPEmb2ot4Fo/X-SMalYSBAAJ
- https://www.djangoproject.com/weblog/2020/jun/03/security-releases/
- https://lists.debian.org/debian-lts-announce/2020/06/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/
- https://security.netapp.com/advisory/ntap-20200611-0002/
- https://usn.ubuntu.com/4381-1/
- https://usn.ubuntu.com/4381-2/
- https://www.debian.org/security/2020/dsa-4705
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://github.com/django/django/commit/07e59caa02831c4569bbebb9eb773bdd9cb4b206
- https://github.com/django/django/commit/84b2da5552e100ae3294f564f6c862fef8d0e693
An issue was discovered in Django version 2.2 before 2.2.13 and 3.0 before 3.0.7. In cases where a memcached backend does not perform key validation, passing malformed cache keys could result in a key collision, and potential data leakage.
418 Other Versions
| Version | License | Security | Released | |
|---|---|---|---|---|
| 4.2.19 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.18 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.17 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.16 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.15 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.14 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.13 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.12 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.11 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.10 | BSD-3-Clause AND BSD | 7 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.9 | BSD-3-Clause AND BSD | 8 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.8 | BSD-3-Clause AND BSD | 8 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.7 | BSD-3-Clause AND BSD | 8 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.6 | BSD-3-Clause AND BSD | 9 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.5 | BSD-3-Clause AND BSD | 10 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.4 | BSD-3-Clause AND BSD | 11 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.3 | BSD-3-Clause AND BSD | 11 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.2 | BSD-3-Clause AND BSD | 12 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.1 | BSD-3-Clause AND BSD | 12 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2 | BSD-3-Clause AND BSD | 12 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.13 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.12 | BSD-3-Clause AND BSD | 3 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.11 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.10 | BSD-3-Clause AND BSD | 5 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.9 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.8 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.7 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.6 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.5 | BSD-3-Clause AND BSD | 7 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.4 | BSD-3-Clause AND BSD | 7 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.3 | BSD-3-Clause AND BSD | 7 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.2 | BSD-3-Clause AND BSD | 7 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.1 | BSD-3-Clause AND BSD | 8 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1 | BSD-3-Clause AND BSD | 8 | 1970-01-01 - 00:00 | almost 56 years |
| 4.0.10 | BSD-3-Clause AND BSD | 3 | 1970-01-01 - 00:00 | almost 56 years |
| 4.0.9 | BSD-3-Clause AND BSD | 3 | 1970-01-01 - 00:00 | almost 56 years |
| 4.0.8 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.0.7 | BSD-3-Clause AND BSD | 5 | 1970-01-01 - 00:00 | almost 56 years |
| 4.0.6 | BSD-3-Clause AND BSD | 5 | 2022-07-04 - 07:57 | over 3 years |
| 4.0.5 | BSD-3-Clause AND BSD | 6 | 2022-06-01 - 12:22 | over 3 years |
| 4.0.4 | BSD-3-Clause AND BSD | 6 | 2022-04-11 - 07:53 | over 3 years |
| 4.0.3 | BSD-3-Clause AND BSD | 6 | 2022-03-01 - 08:47 | almost 4 years |
| 4.0.2 | BSD-3-Clause AND BSD | 6 | 2022-02-01 - 07:56 | almost 4 years |
| 4.0.1 | BSD-3-Clause AND BSD | 8 | 2022-01-04 - 09:53 | almost 4 years |
| 4.0 | BSD-3-Clause AND BSD | 8 | 2021-12-07 - 09:19 | about 4 years |
| 3.2.25 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 3.2.24 | BSD-3-Clause AND BSD | 3 | 1970-01-01 - 00:00 | almost 56 years |
| 3.2.23 | BSD-3-Clause AND BSD | 3 | 1970-01-01 - 00:00 | almost 56 years |
| 3.2.22 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 3.2.21 | BSD-3-Clause AND BSD | 5 | 1970-01-01 - 00:00 | almost 56 years |
