zc_plugin_dm icon indicating copy to clipboard operation
zc_plugin_dm copied to clipboard

CVE-2025-57833 (High) detected in django-4.2.22-py3-none-any.whl

Open mend-bolt-for-github[bot] opened this issue 2 months ago • 0 comments

CVE-2025-57833 - High Severity Vulnerability

Vulnerable Library - django-4.2.22-py3-none-any.whl

A high-level Python web framework that encourages rapid development and clean, pragmatic design.

Library home page: https://files.pythonhosted.org/packages/dc/17/6afcbac3575992b22fda1ae7fffcdff15ff24d1aff69b3d36876bc0a47eb/django-4.2.22-py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /tmp/ws-ua_20250619225906_JOHPWI/python_PXNJNQ/202506192259101/env/lib/python3.9/site-packages/django-4.2.22.dist-info

Dependency Hierarchy:

  • :x: django-4.2.22-py3-none-any.whl (Vulnerable Library)

Found in HEAD commit: 41f949b863ead7c74b72a01845dbe0d88c24a364

Found in base branch: main

Vulnerability Details

An issue was discovered in Django 4.2 before 4.2.24, 5.1 before 5.1.12, and 5.2 before 5.2.6. FilteredRelation is subject to SQL injection in column aliases, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed QuerySet.annotate() or QuerySet.alias().

Publish Date: 2025-09-03

URL: CVE-2025-57833

CVSS 3 Score Details (7.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: Low
    • Availability Impact: None
For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.djangoproject.com/weblog/2025/sep/03/security-releases/

Release Date: 2025-09-03

Fix Resolution: 4.2.24


Step up your Open Source Security Game with Mend here