Python/django/4.1.7
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
https://pypi.org/project/django
BSD-3-Clause AND BSD
6 Security Vulnerabilities
Django Denial of service vulnerability in django.utils.encoding.uri_to_iri
- https://nvd.nist.gov/vuln/detail/CVE-2023-41164
- https://docs.djangoproject.com/en/4.2/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://www.djangoproject.com/weblog/2023/sep/04/security-releases/
- https://github.com/django/django/commit/6f030b1149bd8fa4ba90452e77cb3edc095ce54e
- https://github.com/django/django/commit/9c51b4dcfa0cefcb48231f4d71cafa80821f87b9
- https://github.com/django/django/commit/ba00bc5ec6a7eff5e08be438f7b5b0e9574e8ff0
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-225.yaml
- https://github.com/advisories/GHSA-7h4p-27mh-hmrw
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/
- https://groups.google.com/forum/#%21forum/django-announce
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/
- https://security.netapp.com/advisory/ntap-20231214-0002/
- https://docs.djangoproject.com/en/4.2/releases/security
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU
- https://security.netapp.com/advisory/ntap-20231214-0002
- https://www.djangoproject.com/weblog/2023/sep/04/security-releases
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
In Django 3.2 before 3.2.21, 4.1 before 4.1.11, and 4.2 before 4.2.5, django.utils.encoding.uritoiri() is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
Django vulnerable to SQL injection via _connector keyword argument in QuerySet and Q objects.
- https://nvd.nist.gov/vuln/detail/CVE-2025-64459
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2025/nov/05/security-releases
- https://github.com/django/django/commit/06dd38324ac3d60d83d9f3adabf0dcdf423d2a85
- https://github.com/django/django/commit/59ae82e67053d281ff4562a24bbba21299f0a7d4
- https://github.com/django/django/commit/6703f364d767e949c5b0e4016433ef75063b4f9b
- https://github.com/django/django/commit/72d2c87431f2ae0431d65d0ec792047f078c8241
- https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-64459.html
- https://github.com/advisories/GHSA-frmv-pr5f-9mcr
- https://github.com/omarkurt/django-connector-CVE-2025-64459-testbed
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The methods QuerySet.filter(), QuerySet.exclude(), and QuerySet.get(), and the class Q(), are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the _connector argument. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank cyberstan for reporting this issue.
Django Denial-of-service in django.utils.text.Truncator
- https://nvd.nist.gov/vuln/detail/CVE-2023-43665
- https://docs.djangoproject.com/en/4.2/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://www.djangoproject.com/weblog/2023/oct/04/security-releases/
- https://github.com/django/django/commit/be9c27c4d18c2e6a5be8af4e53c0797440794473
- https://github.com/django/django/commit/c7b7024742250414e426ad49fb80db943e7ba4e8
- https://github.com/django/django/commit/ccdade1a0262537868d7ca64374de3d957ca50c5
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-226.yaml
- https://github.com/advisories/GHSA-h8gc-pgj2-vjm3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/
- https://groups.google.com/forum/#%21forum/django-announce
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU/
- https://docs.djangoproject.com/en/4.2/releases/security
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HJFRPUHDYJHBH3KYHSPGULQM4JN7BMSU
- https://security.netapp.com/advisory/ntap-20231221-0001
- https://www.djangoproject.com/weblog/2023/oct/04/security-releases
- http://www.openwall.com/lists/oss-security/2024/03/04/1
In Django 3.2 before 3.2.22, 4.1 before 4.1.12, and 4.2 before 4.2.6, the django.utils.text.Truncator chars() and words() methods (when used with html=True) are subject to a potential DoS (denial of service) attack via certain inputs with very long, potentially malformed HTML text. The chars() and words() methods are used to implement the truncatecharshtml and truncatewordshtml template filters, which are thus also vulnerable. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232.
Django has regular expression denial of service vulnerability in EmailValidator/URLValidator
- https://nvd.nist.gov/vuln/detail/CVE-2023-36053
- https://docs.djangoproject.com/en/4.2/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://www.djangoproject.com/weblog/2023/jul/03/security-releases/
- https://github.com/django/django/commit/454f2fb93437f98917283336201b4048293f7582
- https://github.com/django/django/commit/ad0410ec4f458aa39803e5f6b9a3736527062dcd
- https://github.com/django/django/commit/b7c5feb35a31799de6e582ad6a5a91a9de74e0f9
- https://github.com/django/django/commit/beb3f3d55940d9aa7198bf9d424ab74e873aec3d
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-100.yaml
- https://github.com/advisories/GHSA-jh3w-4vvf-mjgr
- https://lists.debian.org/debian-lts-announce/2023/07/msg00022.html
- https://www.debian.org/security/2023/dsa-5465
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/
- https://groups.google.com/forum/#%21forum/django-announce
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NRDGTUN4LTI6HG4TWR3JYLSFVXPZT42A/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XG5DYKPNDCEHJQ3TKPJQO7QGSR4FAYMS/
In Django 3.2 before 3.2.20, 4 before 4.1.10, and 4.2 before 4.2.3, EmailValidator and URLValidator are subject to a potential ReDoS (regular expression denial of service) attack via a very large number of domain name labels of emails and URLs.
Django potential denial of service vulnerability in UsernameField on Windows
- https://nvd.nist.gov/vuln/detail/CVE-2023-46695
- https://docs.djangoproject.com/en/4.2/releases/security/
- https://groups.google.com/forum/#!forum/django-announce
- https://www.djangoproject.com/weblog/2023/nov/01/security-releases/
- https://github.com/django/django/commit/048a9ebb6ea468426cb4e57c71572cbbd975517f
- https://github.com/django/django/commit/4965bfdde2e5a5c883685019e57d123a3368a75e
- https://github.com/django/django/commit/f9a7fb8466a7ba4857eaf930099b5258f3eafb2b
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2023-222.yaml
- https://github.com/advisories/GHSA-qmf9-6jqf-j8fq
- https://groups.google.com/forum/#%21forum/django-announce
- https://security.netapp.com/advisory/ntap-20231214-0001/
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
Django has a denial-of-service vulnerability in HttpResponseRedirect and HttpResponsePermanentRedirect on Windows
- https://nvd.nist.gov/vuln/detail/CVE-2025-64458
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2025/nov/05/security-releases
- https://github.com/django/django/commit/3790593781d26168e7306b5b2f8ea0309de16242
- https://github.com/django/django/commit/4f5d904b63751dea9ffc3b0e046404a7fa5881ac
- https://github.com/django/django/commit/6e13348436fccf8f22982921d6a3a3e65c956a9f
- https://github.com/django/django/commit/770eea38d7a0e9ba9455140b5a9a9e33618226a7
- https://github.com/advisories/GHSA-qw25-v68c-qjf3
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. NFKC normalization in Python is slow on Windows. As a consequence, django.http.HttpResponseRedirect, django.http.HttpResponsePermanentRedirect, and the shortcut django.shortcuts.redirect were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
418 Other Versions
| Version | License | Security | Released | |
|---|---|---|---|---|
| 4.2.19 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.18 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.17 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.16 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.15 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.14 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.13 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.12 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.11 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.10 | BSD-3-Clause AND BSD | 7 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.9 | BSD-3-Clause AND BSD | 8 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.8 | BSD-3-Clause AND BSD | 8 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.7 | BSD-3-Clause AND BSD | 8 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.6 | BSD-3-Clause AND BSD | 9 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.5 | BSD-3-Clause AND BSD | 10 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.4 | BSD-3-Clause AND BSD | 11 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.3 | BSD-3-Clause AND BSD | 11 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.2 | BSD-3-Clause AND BSD | 12 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2.1 | BSD-3-Clause AND BSD | 12 | 1970-01-01 - 00:00 | almost 56 years |
| 4.2 | BSD-3-Clause AND BSD | 12 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.13 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.12 | BSD-3-Clause AND BSD | 3 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.11 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.10 | BSD-3-Clause AND BSD | 5 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.9 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.8 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.7 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.6 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.5 | BSD-3-Clause AND BSD | 7 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.4 | BSD-3-Clause AND BSD | 7 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.3 | BSD-3-Clause AND BSD | 7 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.2 | BSD-3-Clause AND BSD | 7 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1.1 | BSD-3-Clause AND BSD | 8 | 1970-01-01 - 00:00 | almost 56 years |
| 4.1 | BSD-3-Clause AND BSD | 8 | 1970-01-01 - 00:00 | almost 56 years |
| 4.0.10 | BSD-3-Clause AND BSD | 3 | 1970-01-01 - 00:00 | almost 56 years |
| 4.0.9 | BSD-3-Clause AND BSD | 3 | 1970-01-01 - 00:00 | almost 56 years |
| 4.0.8 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 4.0.7 | BSD-3-Clause AND BSD | 5 | 1970-01-01 - 00:00 | almost 56 years |
| 4.0.6 | BSD-3-Clause AND BSD | 5 | 2022-07-04 - 07:57 | over 3 years |
| 4.0.5 | BSD-3-Clause AND BSD | 6 | 2022-06-01 - 12:22 | over 3 years |
| 4.0.4 | BSD-3-Clause AND BSD | 6 | 2022-04-11 - 07:53 | over 3 years |
| 4.0.3 | BSD-3-Clause AND BSD | 6 | 2022-03-01 - 08:47 | almost 4 years |
| 4.0.2 | BSD-3-Clause AND BSD | 6 | 2022-02-01 - 07:56 | almost 4 years |
| 4.0.1 | BSD-3-Clause AND BSD | 8 | 2022-01-04 - 09:53 | almost 4 years |
| 4.0 | BSD-3-Clause AND BSD | 8 | 2021-12-07 - 09:19 | about 4 years |
| 3.2.25 | BSD-3-Clause AND BSD | 2 | 1970-01-01 - 00:00 | almost 56 years |
| 3.2.24 | BSD-3-Clause AND BSD | 3 | 1970-01-01 - 00:00 | almost 56 years |
| 3.2.23 | BSD-3-Clause AND BSD | 3 | 1970-01-01 - 00:00 | almost 56 years |
| 3.2.22 | BSD-3-Clause AND BSD | 4 | 1970-01-01 - 00:00 | almost 56 years |
| 3.2.21 | BSD-3-Clause AND BSD | 5 | 1970-01-01 - 00:00 | almost 56 years |
