CVE-2025-64459
Description
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8.
The methods `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()`, and the class `Q()`, are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the `_connector` argument.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank cyberstan for reporting this issue.
CWE
- CWE-89 — CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Affected
- djangoproject / Django — v=5.2 <5.2.8 [affected]; v=5.2.8 [unaffected]; v=5.1 <5.1.14 [affected]; v=5.1.14 [unaffected]; v=4.2 <4.2.26 [affected]; v=4.2.26 [unaffected]
CVSS
- (none)
References
- https://docs.djangoproject.com/en/dev/releases/security/ vendor-advisory
- https://groups.google.com/g/django-announce mailing-list
- https://www.djangoproject.com/weblog/2025/nov/05/security-releases/ vendor-advisory
Source
cvelistV5-main/cves/2025/64xxx/CVE-2025-64459.json