Python/django/4.0.2
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
https://pypi.org/project/django
BSD-3-Clause AND BSD
6 Security Vulnerabilities
Django vulnerable to SQL injection via _connector keyword argument in QuerySet and Q objects.
- https://nvd.nist.gov/vuln/detail/CVE-2025-64459
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2025/nov/05/security-releases
- https://github.com/django/django/commit/06dd38324ac3d60d83d9f3adabf0dcdf423d2a85
- https://github.com/django/django/commit/59ae82e67053d281ff4562a24bbba21299f0a7d4
- https://github.com/django/django/commit/6703f364d767e949c5b0e4016433ef75063b4f9b
- https://github.com/django/django/commit/72d2c87431f2ae0431d65d0ec792047f078c8241
- https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-64459.html
- https://github.com/advisories/GHSA-frmv-pr5f-9mcr
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The methods QuerySet.filter(), QuerySet.exclude(), and QuerySet.get(), and the class Q(), are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the _connector argument. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank cyberstan for reporting this issue.
Django has regular expression denial of service vulnerability in EmailValidator/URLValidator
- https://nvd.nist.gov/vuln/detail/CVE-2023-36053
- https://docs.djangoproject.com/en/4.2/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://www.djangoproject.com/weblog/2023/jul/03/security-releases/
- https://github.com/django/django/commit/454f2fb93437f98917283336201b4048293f7582
- https://github.com/django/django/commit/ad0410ec4f458aa39803e5f6b9a3736527062dcd
- https://github.com/django/django/commit/b7c5feb35a31799de6e582ad6a5a91a9de74e0f9
- https://github.com/django/django/commit/beb3f3d55940d9aa7198bf9d424ab74e873aec3d
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-100.yaml
- https://github.com/advisories/GHSA-jh3w-4vvf-mjgr
- https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html
- https://www.debian.org/security/2023/dsa-5465
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/
- https://groups.google.com/forum/#%21forum/django-announce
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/
In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.
Django `Trunc()` and `Extract()` database functions vulnerable to SQL Injection
- https://nvd.nist.gov/vuln/detail/CVE-2022-34265
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://www.djangoproject.com/weblog/2022/jul/04/security-releases/
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2022-213.yaml
- https://github.com/advisories/GHSA-p64x-8rxx-wf6q
- https://github.com/django/django/commit/5e2f4ddf2940704a26a4ac782b851989668d74db
- https://github.com/django/django/commit/877c800f255ccaa7abde1fb944de45d1616f5cc9
- https://security.netapp.com/advisory/ntap-20220818-0006/
- https://www.debian.org/security/2022/dsa-5254
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
- https://github.com/django/django/commit/0dc9c016fadb71a067e5a42be30164e3f96c0492
- https://github.com/django/django/commit/a9010fe5555e6086a9d9ae50069579400ef0685e
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
Django contains Uncontrolled Resource Consumption via cached header
- https://nvd.nist.gov/vuln/detail/CVE-2023-23969
- https://docs.djangoproject.com/en/4.1/releases/security/
- https://www.djangoproject.com/weblog/2023/feb/01/security-releases/
- https://lists.debian.org/debian-lts-announce/2023/02/msg00000.html
- https://github.com/advisories/GHSA-q2jf-h9jm-m7p4
- https://groups.google.com/forum/#!forum/django-announce
- https://security.netapp.com/advisory/ntap-20230302-0007/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
- https://github.com/django/django/commit/4452642f193533e288a52c02efb5bbc766a68f95
- https://github.com/django/django/commit/9d7bd5a56b1ce0576e8e07a8001373576d277942
- https://github.com/django/django/commit/c7e0151fdf33e1b11d488b6f67b94fdf3a30614a
- https://docs.djangoproject.com/en/4.1/releases/security
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI
- https://security.netapp.com/advisory/ntap-20230302-0007
- https://www.djangoproject.com/weblog/2023/feb/01/security-releases
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-12.yaml
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
Django denial-of-service vulnerability in internationalized URLs
- https://nvd.nist.gov/vuln/detail/CVE-2022-41323
- https://github.com/django/django/commit/5b6b257fa7ec37ff27965358800c67e2dd11c924
- https://www.djangoproject.com/weblog/2022/oct/04/security-releases/
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2022-304.yaml
- https://github.com/advisories/GHSA-qrw5-5h28-6cmg
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://security.netapp.com/advisory/ntap-20221124-0001/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI/
- https://github.com/django/django/commit/23f0093125ac2e553da6c1b2f9988eb6a3dd2ea1
- https://github.com/django/django/commit/9d656ea51d9ea7105c0c0785783ac29d426a7d25
- https://docs.djangoproject.com/en/4.0/releases/security
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FKYVMMR7RPM6AHJ2SBVM2LO6D3NGFY7B
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HWY6DQWRVBALV73BPUVBXC3QIYUM24IK
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LTZVAKU5ALQWOKFTPISE257VCVIYGFQI
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VZS4G6NSZWPTVXMMZHJOJVQEPL3QTO77
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YJB6FUBBLVKKG655UMTLQNN6UQ6EDLSP
- https://security.netapp.com/advisory/ntap-20221124-0001
- https://www.djangoproject.com/weblog/2022/oct/04/security-releases
In Django 3.2 before 3.2.16, 4.0 before 4.0.8, and 4.1 before 4.1.2, internationalized URLs were subject to a potential denial of service attack via the locale parameter, which is treated as a regular expression.
Django has a denial-of-service vulnerability in HttpResponseRedirect and HttpResponsePermanentRedirect on Windows
- https://nvd.nist.gov/vuln/detail/CVE-2025-64458
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2025/nov/05/security-releases
- https://github.com/django/django/commit/3790593781d26168e7306b5b2f8ea0309de16242
- https://github.com/django/django/commit/4f5d904b63751dea9ffc3b0e046404a7fa5881ac
- https://github.com/django/django/commit/6e13348436fccf8f22982921d6a3a3e65c956a9f
- https://github.com/django/django/commit/770eea38d7a0e9ba9455140b5a9a9e33618226a7
- https://github.com/advisories/GHSA-qw25-v68c-qjf3
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. NFKC normalization in Python is slow on Windows. As a consequence, django.http.HttpResponseRedirect, django.http.HttpResponsePermanentRedirect, and the shortcut django.shortcuts.redirect were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
414 Other Versions
| Version | License | Security | Released | |
|---|---|---|---|---|
| 5.2.8 | UNKNOWN | |||
| 5.2.7 | BSD-3-Clause AND BSD | 2 | ||
| 5.2.6 | BSD-3-Clause AND BSD | 4 | ||
| 5.2.5 | BSD-3-Clause AND BSD | 4 | ||
| 5.2.4 | BSD-3-Clause AND BSD | 4 | ||
| 5.2.3 | BSD-3-Clause AND BSD | 4 | ||
| 5.2.2 | BSD-3-Clause AND BSD | 4 | ||
| 5.2.1 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.2 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.14 | UNKNOWN | |||
| 5.1.13 | BSD-3-Clause AND BSD | 2 | ||
| 5.1.12 | BSD-3-Clause AND BSD | 4 | ||
| 5.1.11 | BSD-3-Clause AND BSD | 4 | ||
| 5.1.10 | BSD-3-Clause AND BSD | 4 | ||
| 5.1.9 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.8 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.7 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.6 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.5 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.4 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.3 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.2 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1.1 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 5.1 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.14 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.13 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.12 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.11 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.10 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.9 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.8 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.7 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.6 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.5 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.4 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.3 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.2 | BSD-3-Clause AND BSD | 5 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0.1 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 5.0 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.26 | BSD-3-Clause AND BSD | |||
| 4.2.25 | BSD-3-Clause AND BSD | 2 | ||
| 4.2.24 | BSD-3-Clause AND BSD | 4 | ||
| 4.2.23 | BSD-3-Clause AND BSD | 4 | ||
| 4.2.22 | BSD-3-Clause AND BSD | 4 | ||
| 4.2.21 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.20 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.19 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.18 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.17 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.16 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
