Python/django/4.2.9
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
https://pypi.org/project/django
BSD-3-Clause AND BSD
8 Security Vulnerabilities
Django denial-of-service in django.utils.html.strip_tags()
- https://nvd.nist.gov/vuln/detail/CVE-2024-53907
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.openwall.com/lists/oss-security/2024/12/04/3
- https://www.djangoproject.com/weblog/2024/dec/04/security-releases
- https://lists.debian.org/debian-lts-announce/2024/12/msg00028.html
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-156.yaml
- https://github.com/advisories/GHSA-8498-2h75-472j
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. The strip_tags() method and striptags template filter are subject to a potential denial-of-service attack via certain inputs containing large sequences of nested incomplete HTML entities.
Django vulnerable to SQL injection via _connector keyword argument in QuerySet and Q objects.
- https://nvd.nist.gov/vuln/detail/CVE-2025-64459
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2025/nov/05/security-releases
- https://github.com/django/django/commit/06dd38324ac3d60d83d9f3adabf0dcdf423d2a85
- https://github.com/django/django/commit/59ae82e67053d281ff4562a24bbba21299f0a7d4
- https://github.com/django/django/commit/6703f364d767e949c5b0e4016433ef75063b4f9b
- https://github.com/django/django/commit/72d2c87431f2ae0431d65d0ec792047f078c8241
- https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-64459.html
- https://github.com/advisories/GHSA-frmv-pr5f-9mcr
- https://github.com/omarkurt/django-connector-CVE-2025-64459-testbed
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The methods QuerySet.filter(), QuerySet.exclude(), and QuerySet.get(), and the class Q(), are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the _connector argument. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank cyberstan for reporting this issue.
Django vulnerable to SQL injection in column aliases
- https://nvd.nist.gov/vuln/detail/CVE-2025-59681
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2025/oct/01/security-releases
- https://github.com/django/django/commit/41b43c74bda19753c757036673ea9db74acf494a
- https://github.com/django/django/commit/43d84aef04a9e71164c21a74885996981857e66e
- http://www.openwall.com/lists/oss-security/2025/10/01/3
- https://github.com/advisories/GHSA-hpr9-3m2g-3j9p
An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. QuerySet.annotate(), QuerySet.alias(), QuerySet.aggregate(), and QuerySet.extra() are subject to SQL injection in column aliases, when using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to these methods (on MySQL and MariaDB).
Django SQL injection in HasKey(lhs, rhs) on Oracle
- https://nvd.nist.gov/vuln/detail/CVE-2024-53908
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.openwall.com/lists/oss-security/2024/12/04/3
- https://www.djangoproject.com/weblog/2024/dec/04/security-releases
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-157.yaml
- https://github.com/advisories/GHSA-m9g8-fxxm-xg86
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. Direct usage of the django.db.models.fields.json.HasKey lookup, when an Oracle database is used, is subject to SQL injection if untrusted data is used as an lhs value. (Applications that use the jsonfield.haskey lookup via _ are unaffected.)
Django vulnerable to partial directory traversal via archives
- https://nvd.nist.gov/vuln/detail/CVE-2025-59682
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2025/oct/01/security-releases
- https://github.com/django/django/commit/43d84aef04a9e71164c21a74885996981857e66e
- https://github.com/django/django/commit/924a0c092e65fa2d0953fd1855d2dc8786d94de2
- http://www.openwall.com/lists/oss-security/2025/10/01/3
- https://github.com/advisories/GHSA-q95w-c7qg-hrff
An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the startapp --template
and startproject --template
commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory.
Django has a denial-of-service vulnerability in HttpResponseRedirect and HttpResponsePermanentRedirect on Windows
- https://nvd.nist.gov/vuln/detail/CVE-2025-64458
- https://docs.djangoproject.com/en/dev/releases/security
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2025/nov/05/security-releases
- https://github.com/django/django/commit/3790593781d26168e7306b5b2f8ea0309de16242
- https://github.com/django/django/commit/4f5d904b63751dea9ffc3b0e046404a7fa5881ac
- https://github.com/django/django/commit/6e13348436fccf8f22982921d6a3a3e65c956a9f
- https://github.com/django/django/commit/770eea38d7a0e9ba9455140b5a9a9e33618226a7
- https://github.com/advisories/GHSA-qw25-v68c-qjf3
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. NFKC normalization in Python is slow on Windows. As a consequence, django.http.HttpResponseRedirect, django.http.HttpResponsePermanentRedirect, and the shortcut django.shortcuts.redirect were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
Regular expression denial-of-service in Django
- https://nvd.nist.gov/vuln/detail/CVE-2024-27351
- https://docs.djangoproject.com/en/5.0/releases/security
- https://groups.google.com/forum/#%21forum/django-announce
- https://www.djangoproject.com/weblog/2024/mar/04/security-releases
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-47.yaml
- https://github.com/advisories/GHSA-vm8q-m57g-pff3
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
- http://www.openwall.com/lists/oss-security/2024/03/04/1
- https://github.com/django/django/commit/072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521
- https://github.com/django/django/commit/3394fc6132436eca89e997083bae9985fb7e761e
- https://github.com/django/django/commit/3c9a2771cc80821e041b16eb36c1c37af5349d4a
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.
Django denial-of-service attack in the intcomma template filter
- https://nvd.nist.gov/vuln/detail/CVE-2024-24680
- https://docs.djangoproject.com/en/5.0/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://www.djangoproject.com/weblog/2024/feb/06/security-releases/
- https://github.com/django/django/commit/16a8fe18a3b81250f4fa57e3f93f0599dc4895bc
- https://github.com/django/django/commit/55519d6cf8998fe4c8f5c8abffc2b10a7c3d14e9
- https://github.com/django/django/commit/572ea07e84b38ea8de0551f4b4eda685d91d09d2
- https://github.com/django/django/commit/c1171ffbd570db90ca206c30f8e2b9f691243820
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-28.yaml
- https://github.com/advisories/GHSA-xxj9-f6rv-m3x4
- https://docs.djangoproject.com/en/5.0/releases/security
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
- https://www.djangoproject.com/weblog/2024/feb/06/security-releases
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZQJOMNRMVPCN5WMIZ7YSX5LQ7IR2NY4D
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2JIRXEDP4ZET5KFMAPPYSK663Q52NEX
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SN2PLJGYSAAG5KUVIUFJYKD3BLQ4OSN6
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
418 Other Versions
| Version | License | Security | Released | |
|---|---|---|---|---|
| 3.2.20 | BSD-3-Clause AND BSD | 6 | 1970-01-01 - 00:00 | about 56 years |
| 3.2.19 | BSD-3-Clause AND BSD | 7 | 1970-01-01 - 00:00 | about 56 years |
| 3.2.18 | BSD-3-Clause AND BSD | 7 | 1970-01-01 - 00:00 | about 56 years |
| 3.2.17 | BSD-3-Clause AND BSD | 7 | 1970-01-01 - 00:00 | about 56 years |
| 3.2.16 | BSD-3-Clause AND BSD | 8 | 1970-01-01 - 00:00 | about 56 years |
| 3.2.15 | BSD-3-Clause AND BSD | 9 | 1970-01-01 - 00:00 | about 56 years |
| 3.2.14 | BSD-3-Clause AND BSD | 9 | 2022-07-04 - 07:57 | over 3 years |
| 3.2.13 | BSD-3-Clause AND BSD | 10 | 2022-04-11 - 07:52 | over 3 years |
| 3.2.12 | BSD-3-Clause AND BSD | 10 | 2022-02-01 - 07:56 | almost 4 years |
| 3.2.11 | BSD-3-Clause AND BSD | 12 | 2022-01-04 - 09:53 | about 4 years |
| 3.2.10 | BSD-3-Clause AND BSD | 12 | 2021-12-07 - 07:34 | about 4 years |
| 3.2.9 | BSD-3-Clause AND BSD | 12 | 2021-11-01 - 09:31 | about 4 years |
| 3.2.8 | BSD-3-Clause AND BSD | 12 | 2021-10-05 - 07:46 | over 4 years |
| 3.2.7 | BSD-3-Clause AND BSD | 12 | 2021-09-01 - 05:57 | over 4 years |
| 3.2.6 | BSD-3-Clause AND BSD | 12 | 2021-08-02 - 06:28 | over 4 years |
| 3.2.5 | BSD-3-Clause AND BSD | 12 | 2021-07-01 - 07:40 | over 4 years |
| 3.2.4 | BSD-3-Clause AND BSD | 12 | 2021-06-02 - 08:54 | over 4 years |
| 3.2.3 | BSD-3-Clause AND BSD | 13 | 2021-05-13 - 07:36 | over 4 years |
| 3.2.2 | BSD-3-Clause AND BSD | 13 | 2021-05-06 - 07:40 | over 4 years |
| 3.2.1 | BSD-3-Clause AND BSD | 13 | 2021-05-04 - 08:47 | over 4 years |
| 3.2 | BSD-3-Clause AND BSD | 13 | 2021-04-06 - 09:33 | over 4 years |
| 3.1.14 | BSD-3-Clause AND BSD | 2 | 2021-12-07 - 07:34 | about 4 years |
| 3.1.13 | BSD-3-Clause AND BSD | 2 | 2021-07-01 - 07:39 | over 4 years |
| 3.1.12 | BSD-3-Clause AND BSD | 2 | 2021-06-02 - 08:53 | over 4 years |
| 3.1.11 | BSD-3-Clause AND BSD | 3 | 2021-05-13 - 07:36 | over 4 years |
| 3.1.10 | BSD-3-Clause AND BSD | 3 | 2021-05-06 - 07:40 | over 4 years |
| 3.1.9 | BSD-3-Clause AND BSD | 3 | 2021-05-04 - 08:47 | over 4 years |
| 3.1.8 | BSD-3-Clause AND BSD | 3 | 2021-04-06 - 07:34 | almost 5 years |
| 3.1.7 | BSD-3-Clause AND BSD | 3 | 2021-02-19 - 09:08 | almost 5 years |
| 3.1.6 | BSD-3-Clause AND BSD | 3 | 2021-02-01 - 09:28 | almost 5 years |
| 3.1.5 | BSD-3-Clause AND BSD | 4 | 2021-01-04 - 07:54 | about 5 years |
| 3.1.4 | BSD-3-Clause AND BSD | 4 | 2020-12-01 - 06:03 | about 5 years |
| 3.1.3 | BSD-3-Clause AND BSD | 4 | 2020-11-02 - 08:12 | about 5 years |
| 3.1.2 | BSD-3-Clause AND BSD | 4 | 2020-10-01 - 05:38 | over 5 years |
| 3.1.1 | BSD-3-Clause AND BSD | 4 | 2020-09-01 - 09:14 | over 5 years |
| 3.1 | BSD-3-Clause AND BSD | 6 | 2020-08-04 - 08:07 | over 5 years |
| 3.0.14 | BSD | 3 | 2021-04-06 - 07:34 | almost 5 years |
| 3.0.13 | BSD | 3 | 2021-02-19 - 09:08 | almost 5 years |
| 3.0.12 | BSD | 3 | 2021-02-01 - 09:28 | almost 5 years |
| 3.0.11 | BSD | 4 | 2020-11-02 - 08:12 | about 5 years |
| 3.0.10 | BSD | 4 | 2020-09-01 - 09:14 | over 5 years |
| 3.0.9 | BSD | 6 | 2020-08-03 - 07:23 | over 5 years |
| 3.0.8 | BSD | 6 | 2020-07-01 - 04:49 | over 5 years |
| 3.0.7 | BSD | 6 | 2020-06-03 - 09:36 | over 5 years |
| 3.0.6 | BSD | 8 | 2020-05-04 - 05:26 | over 5 years |
| 3.0.5 | BSD | 8 | 2020-04-01 - 07:59 | almost 6 years |
| 3.0.4 | BSD | 8 | 2020-03-04 - 09:31 | almost 6 years |
| 3.0.3 | BSD | 9 | 2020-02-03 - 09:50 | almost 6 years |
| 3.0.2 | BSD | 9 | 2020-01-02 - 07:22 | about 6 years |
| 3.0.1 | BSD | 9 | 2019-12-18 - 08:59 | about 6 years |
