Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2026-1285 (GCVE-0-2026-1285)
Vulnerability from cvelistv5 – Published: 2026-02-03 14:35 – Updated: 2026-02-03 16:22- CWE-407 - Inefficient Algorithmic Complexity
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| djangoproject | Django |
Affected:
6.0 , < 6.0.2
(semver)
Unaffected: 6.0.2 (semver) Affected: 5.2 , < 5.2.11 (semver) Unaffected: 5.2.11 (semver) Affected: 4.2 , < 4.2.28 (semver) Unaffected: 4.2.28 (semver) |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2026-1285",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-02-03T16:22:30.293747Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-02-03T16:22:33.352Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pypi.org/project/Django/",
"defaultStatus": "unaffected",
"packageName": "django",
"product": "Django",
"repo": "https://github.com/django/django/",
"vendor": "djangoproject",
"versions": [
{
"lessThan": "6.0.2",
"status": "affected",
"version": "6.0",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "6.0.2",
"versionType": "semver"
},
{
"lessThan": "5.2.11",
"status": "affected",
"version": "5.2",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "5.2.11",
"versionType": "semver"
},
{
"lessThan": "4.2.28",
"status": "affected",
"version": "4.2",
"versionType": "semver"
},
{
"status": "unaffected",
"version": "4.2.28",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "Seokchan Yoon"
},
{
"lang": "en",
"type": "remediation developer",
"value": "Natalia Bidart"
},
{
"lang": "en",
"type": "coordinator",
"value": "Jacob Walls"
}
],
"datePublic": "2026-02-03T08:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\u003c/p\u003e\u003cp\u003e`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags.\u003c/p\u003e\u003cp\u003eEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\u003c/p\u003e\u003cp\u003eDjango would like to thank Seokchan Yoon for reporting this issue.\u003c/p\u003e"
}
],
"value": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Seokchan Yoon for reporting this issue."
}
],
"impacts": [
{
"capecId": "CAPEC-130",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-130: Excessive Allocation"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://docs.djangoproject.com/en/dev/internals/security/#security-issue-severity-levels",
"value": "moderate"
},
"type": "Django severity rating"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-407",
"description": "CWE-407: Inefficient Algorithmic Complexity",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-03T14:35:50.254Z",
"orgId": "6a34fbeb-21d4-45e7-8e0a-62b95bc12c92",
"shortName": "DSF"
},
"references": [
{
"name": "Django security archive",
"tags": [
"vendor-advisory"
],
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"name": "Django releases announcements",
"tags": [
"mailing-list"
],
"url": "https://groups.google.com/g/django-announce"
},
{
"name": "Django security releases issued: 6.0.2, 5.2.11, and 4.2.28",
"tags": [
"vendor-advisory"
],
"url": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/"
}
],
"source": {
"discovery": "EXTERNAL"
},
"timeline": [
{
"lang": "en",
"time": "2026-01-20T18:00:00",
"value": "Initial report received."
},
{
"lang": "en",
"time": "2026-01-22T18:00:00",
"value": "Vulnerability confirmed."
},
{
"lang": "en",
"time": "2026-02-03T08:00:00",
"value": "Security release issued."
}
],
"title": "Potential denial-of-service vulnerability in django.utils.text.Truncator HTML methods",
"x_generator": {
"engine": "cvelib 1.8.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "6a34fbeb-21d4-45e7-8e0a-62b95bc12c92",
"assignerShortName": "DSF",
"cveId": "CVE-2026-1285",
"datePublished": "2026-02-03T14:35:50.254Z",
"dateReserved": "2026-01-21T12:49:21.258Z",
"dateUpdated": "2026-02-03T16:22:33.352Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2026-1285\",\"sourceIdentifier\":\"6a34fbeb-21d4-45e7-8e0a-62b95bc12c92\",\"published\":\"2026-02-03T15:16:13.570\",\"lastModified\":\"2026-02-04T17:09:01.357\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\\n`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags.\\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\\nDjango would like to thank Seokchan Yoon for reporting this issue.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"6a34fbeb-21d4-45e7-8e0a-62b95bc12c92\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-407\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2\",\"versionEndExcluding\":\"4.2.28\",\"matchCriteriaId\":\"59566A1F-D2C5-43D6-97AA-258EFD90B937\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.2\",\"versionEndExcluding\":\"5.2.11\",\"matchCriteriaId\":\"845BC013-1341-4D81-A5F1-507C814ABA7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0\",\"versionEndExcluding\":\"6.0.2\",\"matchCriteriaId\":\"4ACBCB7B-B8F4-4EEF-842D-0CCB8674BCD2\"}]}]}],\"references\":[{\"url\":\"https://docs.djangoproject.com/en/dev/releases/security/\",\"source\":\"6a34fbeb-21d4-45e7-8e0a-62b95bc12c92\",\"tags\":[\"Vendor Advisory\",\"Patch\"]},{\"url\":\"https://groups.google.com/g/django-announce\",\"source\":\"6a34fbeb-21d4-45e7-8e0a-62b95bc12c92\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://www.djangoproject.com/weblog/2026/feb/03/security-releases/\",\"source\":\"6a34fbeb-21d4-45e7-8e0a-62b95bc12c92\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2026-1285\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-02-03T16:22:30.293747Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-02-03T16:22:24.499Z\"}}], \"cna\": {\"title\": \"Potential denial-of-service vulnerability in django.utils.text.Truncator HTML methods\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Seokchan Yoon\"}, {\"lang\": \"en\", \"type\": \"remediation developer\", \"value\": \"Natalia Bidart\"}, {\"lang\": \"en\", \"type\": \"coordinator\", \"value\": \"Jacob Walls\"}], \"impacts\": [{\"capecId\": \"CAPEC-130\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-130: Excessive Allocation\"}]}], \"metrics\": [{\"other\": {\"type\": \"Django severity rating\", \"content\": {\"value\": \"moderate\", \"namespace\": \"https://docs.djangoproject.com/en/dev/internals/security/#security-issue-severity-levels\"}}}], \"affected\": [{\"repo\": \"https://github.com/django/django/\", \"vendor\": \"djangoproject\", \"product\": \"Django\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.0\", \"lessThan\": \"6.0.2\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"6.0.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"5.2\", \"lessThan\": \"5.2.11\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"5.2.11\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"4.2\", \"lessThan\": \"4.2.28\", \"versionType\": \"semver\"}, {\"status\": \"unaffected\", \"version\": \"4.2.28\", \"versionType\": \"semver\"}], \"packageName\": \"django\", \"collectionURL\": \"https://pypi.org/project/Django/\", \"defaultStatus\": \"unaffected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2026-01-20T18:00:00\", \"value\": \"Initial report received.\"}, {\"lang\": \"en\", \"time\": \"2026-01-22T18:00:00\", \"value\": \"Vulnerability confirmed.\"}, {\"lang\": \"en\", \"time\": \"2026-02-03T08:00:00\", \"value\": \"Security release issued.\"}], \"datePublic\": \"2026-02-03T08:00:00.000Z\", \"references\": [{\"url\": \"https://docs.djangoproject.com/en/dev/releases/security/\", \"name\": \"Django security archive\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://groups.google.com/g/django-announce\", \"name\": \"Django releases announcements\", \"tags\": [\"mailing-list\"]}, {\"url\": \"https://www.djangoproject.com/weblog/2026/feb/03/security-releases/\", \"name\": \"Django security releases issued: 6.0.2, 5.2.11, and 4.2.28\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"cvelib 1.8.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\\n`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags.\\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\\nDjango would like to thank Seokchan Yoon for reporting this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eAn issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\u003c/p\u003e\u003cp\u003e`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags.\u003c/p\u003e\u003cp\u003eEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\u003c/p\u003e\u003cp\u003eDjango would like to thank Seokchan Yoon for reporting this issue.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-407\", \"description\": \"CWE-407: Inefficient Algorithmic Complexity\"}]}], \"providerMetadata\": {\"orgId\": \"6a34fbeb-21d4-45e7-8e0a-62b95bc12c92\", \"shortName\": \"DSF\", \"dateUpdated\": \"2026-02-03T14:35:50.254Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2026-1285\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-03T16:22:33.352Z\", \"dateReserved\": \"2026-01-21T12:49:21.258Z\", \"assignerOrgId\": \"6a34fbeb-21d4-45e7-8e0a-62b95bc12c92\", \"datePublished\": \"2026-02-03T14:35:50.254Z\", \"assignerShortName\": \"DSF\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
OPENSUSE-SU-2026:10160-1
Vulnerability from csaf_opensuse - Published: 2026-02-06 00:00 - Updated: 2026-02-06 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python311-Django-5.2.11-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python311-Django-5.2.11-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10160",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10160-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13473 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13473/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14550 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14550/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1207 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1285 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1287 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1287/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1312 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1312/"
}
],
"title": "python311-Django-5.2.11-1.1 on GA media",
"tracking": {
"current_release_date": "2026-02-06T00:00:00Z",
"generator": {
"date": "2026-02-06T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10160-1",
"initial_release_date": "2026-02-06T00:00:00Z",
"revision_history": [
{
"date": "2026-02-06T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python311-Django-5.2.11-1.1.aarch64",
"product": {
"name": "python311-Django-5.2.11-1.1.aarch64",
"product_id": "python311-Django-5.2.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-Django-5.2.11-1.1.aarch64",
"product": {
"name": "python312-Django-5.2.11-1.1.aarch64",
"product_id": "python312-Django-5.2.11-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-Django-5.2.11-1.1.aarch64",
"product": {
"name": "python313-Django-5.2.11-1.1.aarch64",
"product_id": "python313-Django-5.2.11-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-Django-5.2.11-1.1.ppc64le",
"product": {
"name": "python311-Django-5.2.11-1.1.ppc64le",
"product_id": "python311-Django-5.2.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-Django-5.2.11-1.1.ppc64le",
"product": {
"name": "python312-Django-5.2.11-1.1.ppc64le",
"product_id": "python312-Django-5.2.11-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-Django-5.2.11-1.1.ppc64le",
"product": {
"name": "python313-Django-5.2.11-1.1.ppc64le",
"product_id": "python313-Django-5.2.11-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-Django-5.2.11-1.1.s390x",
"product": {
"name": "python311-Django-5.2.11-1.1.s390x",
"product_id": "python311-Django-5.2.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-Django-5.2.11-1.1.s390x",
"product": {
"name": "python312-Django-5.2.11-1.1.s390x",
"product_id": "python312-Django-5.2.11-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-Django-5.2.11-1.1.s390x",
"product": {
"name": "python313-Django-5.2.11-1.1.s390x",
"product_id": "python313-Django-5.2.11-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-Django-5.2.11-1.1.x86_64",
"product": {
"name": "python311-Django-5.2.11-1.1.x86_64",
"product_id": "python311-Django-5.2.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-Django-5.2.11-1.1.x86_64",
"product": {
"name": "python312-Django-5.2.11-1.1.x86_64",
"product_id": "python312-Django-5.2.11-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-Django-5.2.11-1.1.x86_64",
"product": {
"name": "python313-Django-5.2.11-1.1.x86_64",
"product_id": "python313-Django-5.2.11-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Django-5.2.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64"
},
"product_reference": "python311-Django-5.2.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Django-5.2.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le"
},
"product_reference": "python311-Django-5.2.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Django-5.2.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x"
},
"product_reference": "python311-Django-5.2.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-Django-5.2.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64"
},
"product_reference": "python311-Django-5.2.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Django-5.2.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64"
},
"product_reference": "python312-Django-5.2.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Django-5.2.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le"
},
"product_reference": "python312-Django-5.2.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Django-5.2.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x"
},
"product_reference": "python312-Django-5.2.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-Django-5.2.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64"
},
"product_reference": "python312-Django-5.2.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Django-5.2.11-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64"
},
"product_reference": "python313-Django-5.2.11-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Django-5.2.11-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le"
},
"product_reference": "python313-Django-5.2.11-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Django-5.2.11-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x"
},
"product_reference": "python313-Django-5.2.11-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Django-5.2.11-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
},
"product_reference": "python313-Django-5.2.11-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13473",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13473"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\nThe `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Stackered for reporting this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13473",
"url": "https://www.suse.com/security/cve/CVE-2025-13473"
},
{
"category": "external",
"summary": "SUSE Bug 1257401 for CVE-2025-13473",
"url": "https://bugzilla.suse.com/1257401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-06T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-13473"
},
{
"cve": "CVE-2025-14550",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14550"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n`ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Jiyong Yang for reporting this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14550",
"url": "https://www.suse.com/security/cve/CVE-2025-14550"
},
{
"category": "external",
"summary": "SUSE Bug 1257403 for CVE-2025-14550",
"url": "https://bugzilla.suse.com/1257403"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-06T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-14550"
},
{
"cve": "CVE-2026-1207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1207"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\nRaster lookups on ``RasterField`` (only implemented on PostGIS) allows remote attackers to inject SQL via the band index parameter.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Tarek Nakkouch for reporting this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1207",
"url": "https://www.suse.com/security/cve/CVE-2026-1207"
},
{
"category": "external",
"summary": "SUSE Bug 1257405 for CVE-2026-1207",
"url": "https://bugzilla.suse.com/1257405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-06T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-1207"
},
{
"cve": "CVE-2026-1285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1285"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Seokchan Yoon for reporting this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1285",
"url": "https://www.suse.com/security/cve/CVE-2026-1285"
},
{
"category": "external",
"summary": "SUSE Bug 1257406 for CVE-2026-1285",
"url": "https://bugzilla.suse.com/1257406"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-06T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-1285"
},
{
"cve": "CVE-2026-1287",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1287"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n`FilteredRelation` is subject to SQL injection in column aliases via control characters, using a suitably crafted dictionary, with dictionary expansion, as the `**kwargs` passed to `QuerySet` methods `annotate()`, `aggregate()`, `extra()`, `values()`, `values_list()`, and `alias()`.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Solomon Kebede for reporting this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1287",
"url": "https://www.suse.com/security/cve/CVE-2026-1287"
},
{
"category": "external",
"summary": "SUSE Bug 1257407 for CVE-2026-1287",
"url": "https://bugzilla.suse.com/1257407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-06T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-1287"
},
{
"cve": "CVE-2026-1312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1312"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n`.QuerySet.order_by()` is subject to SQL injection in column aliases containing periods when the same alias is, using a suitably crafted dictionary, with dictionary expansion, used in `FilteredRelation`.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Solomon Kebede for reporting this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1312",
"url": "https://www.suse.com/security/cve/CVE-2026-1312"
},
{
"category": "external",
"summary": "SUSE Bug 1257408 for CVE-2026-1312",
"url": "https://bugzilla.suse.com/1257408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python311-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python312-Django-5.2.11-1.1.x86_64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.aarch64",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.ppc64le",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.s390x",
"openSUSE Tumbleweed:python313-Django-5.2.11-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-06T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2026-1312"
}
]
}
OPENSUSE-SU-2026:20184-1
Vulnerability from csaf_opensuse - Published: 2026-02-07 13:45 - Updated: 2026-02-07 13:45Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-Django",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-Django fixes the following issues:\n\nChanges in python-Django:\n\n- CVE-2026-1312: Fixed potential SQL injection via QuerySet.order_by and FilteredRelation (bsc#1257408).\n- CVE-2026-1287: Fixed potential SQL injection in column aliases via control characters (bsc#1257407).\n- CVE-2026-1207: Fixed potential SQL injection via raster lookups on PostGIS (bsc#1257405).\n- CVE-2026-1285: Fixed potential denial-of-service in django.utils.text.Truncator HTML methods (bsc#1257406).\n- CVE-2025-13473: Fixed username enumeration through timing difference in mod_wsgi authentication handler (bsc#1257401).\n- CVE-2025-14550: Fixed potential denial-of-service via repeated headers when using ASGI (bsc#1257403).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-packagehub-113",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20184-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1257401",
"url": "https://bugzilla.suse.com/1257401"
},
{
"category": "self",
"summary": "SUSE Bug 1257403",
"url": "https://bugzilla.suse.com/1257403"
},
{
"category": "self",
"summary": "SUSE Bug 1257405",
"url": "https://bugzilla.suse.com/1257405"
},
{
"category": "self",
"summary": "SUSE Bug 1257406",
"url": "https://bugzilla.suse.com/1257406"
},
{
"category": "self",
"summary": "SUSE Bug 1257407",
"url": "https://bugzilla.suse.com/1257407"
},
{
"category": "self",
"summary": "SUSE Bug 1257408",
"url": "https://bugzilla.suse.com/1257408"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13473 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13473/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14550 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14550/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1207 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1207/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1285 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1285/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1287 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1287/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-1312 page",
"url": "https://www.suse.com/security/cve/CVE-2026-1312/"
}
],
"title": "Security update for python-Django",
"tracking": {
"current_release_date": "2026-02-07T13:45:17Z",
"generator": {
"date": "2026-02-07T13:45:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20184-1",
"initial_release_date": "2026-02-07T13:45:17Z",
"revision_history": [
{
"date": "2026-02-07T13:45:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python313-Django-5.2.4-bp160.5.1.noarch",
"product": {
"name": "python313-Django-5.2.4-bp160.5.1.noarch",
"product_id": "python313-Django-5.2.4-bp160.5.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-Django-5.2.4-bp160.5.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
},
"product_reference": "python313-Django-5.2.4-bp160.5.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13473",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13473"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\nThe `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Stackered for reporting this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13473",
"url": "https://www.suse.com/security/cve/CVE-2025-13473"
},
{
"category": "external",
"summary": "SUSE Bug 1257401 for CVE-2025-13473",
"url": "https://bugzilla.suse.com/1257401"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-07T13:45:17Z",
"details": "important"
}
],
"title": "CVE-2025-13473"
},
{
"cve": "CVE-2025-14550",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14550"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n`ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Jiyong Yang for reporting this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14550",
"url": "https://www.suse.com/security/cve/CVE-2025-14550"
},
{
"category": "external",
"summary": "SUSE Bug 1257403 for CVE-2025-14550",
"url": "https://bugzilla.suse.com/1257403"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-07T13:45:17Z",
"details": "important"
}
],
"title": "CVE-2025-14550"
},
{
"cve": "CVE-2026-1207",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1207"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\nRaster lookups on ``RasterField`` (only implemented on PostGIS) allows remote attackers to inject SQL via the band index parameter.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Tarek Nakkouch for reporting this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1207",
"url": "https://www.suse.com/security/cve/CVE-2026-1207"
},
{
"category": "external",
"summary": "SUSE Bug 1257405 for CVE-2026-1207",
"url": "https://bugzilla.suse.com/1257405"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-07T13:45:17Z",
"details": "important"
}
],
"title": "CVE-2026-1207"
},
{
"cve": "CVE-2026-1285",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1285"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Seokchan Yoon for reporting this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1285",
"url": "https://www.suse.com/security/cve/CVE-2026-1285"
},
{
"category": "external",
"summary": "SUSE Bug 1257406 for CVE-2026-1285",
"url": "https://bugzilla.suse.com/1257406"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-07T13:45:17Z",
"details": "important"
}
],
"title": "CVE-2026-1285"
},
{
"cve": "CVE-2026-1287",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1287"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n`FilteredRelation` is subject to SQL injection in column aliases via control characters, using a suitably crafted dictionary, with dictionary expansion, as the `**kwargs` passed to `QuerySet` methods `annotate()`, `aggregate()`, `extra()`, `values()`, `values_list()`, and `alias()`.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Solomon Kebede for reporting this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1287",
"url": "https://www.suse.com/security/cve/CVE-2026-1287"
},
{
"category": "external",
"summary": "SUSE Bug 1257407 for CVE-2026-1287",
"url": "https://bugzilla.suse.com/1257407"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-07T13:45:17Z",
"details": "important"
}
],
"title": "CVE-2026-1287"
},
{
"cve": "CVE-2026-1312",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-1312"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n`.QuerySet.order_by()` is subject to SQL injection in column aliases containing periods when the same alias is, using a suitably crafted dictionary, with dictionary expansion, used in `FilteredRelation`.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Solomon Kebede for reporting this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-1312",
"url": "https://www.suse.com/security/cve/CVE-2026-1312"
},
{
"category": "external",
"summary": "SUSE Bug 1257408 for CVE-2026-1312",
"url": "https://bugzilla.suse.com/1257408"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:python313-Django-5.2.4-bp160.5.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-02-07T13:45:17Z",
"details": "important"
}
],
"title": "CVE-2026-1312"
}
]
}
bit-django-2026-1285
Vulnerability from bitnami_vulndb
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
django.utils.text.Truncator.chars() and Truncator.words() methods (with html=True) and the truncatechars_html and truncatewords_html template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Seokchan Yoon for reporting this issue.
{
"affected": [
{
"package": {
"ecosystem": "Bitnami",
"name": "django",
"purl": "pkg:bitnami/django"
},
"ranges": [
{
"events": [
{
"introduced": "4.2.0"
},
{
"fixed": "4.2.28"
},
{
"introduced": "5.2.0"
},
{
"fixed": "5.2.11"
},
{
"introduced": "6.0.0"
},
{
"fixed": "6.0.2"
}
],
"type": "SEMVER"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
],
"aliases": [
"CVE-2026-1285"
],
"database_specific": {
"cpes": [
"cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*"
],
"severity": "High"
},
"details": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Seokchan Yoon for reporting this issue.",
"id": "BIT-django-2026-1285",
"modified": "2026-02-05T09:10:30.960Z",
"published": "2026-02-05T08:38:39.228Z",
"references": [
{
"type": "WEB",
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/django-announce"
},
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1285"
},
{
"type": "WEB",
"url": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/"
}
],
"schema_version": "1.6.2",
"summary": "Potential denial-of-service vulnerability in django.utils.text.Truncator HTML methods"
}
FKIE_CVE-2026-1285
Vulnerability from fkie_nvd - Published: 2026-02-03 15:16 - Updated: 2026-02-04 17:09| Vendor | Product | Version | |
|---|---|---|---|
| djangoproject | django | * | |
| djangoproject | django | * | |
| djangoproject | django | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59566A1F-D2C5-43D6-97AA-258EFD90B937",
"versionEndExcluding": "4.2.28",
"versionStartIncluding": "4.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"matchCriteriaId": "845BC013-1341-4D81-A5F1-507C814ABA7E",
"versionEndExcluding": "5.2.11",
"versionStartIncluding": "5.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4ACBCB7B-B8F4-4EEF-842D-0CCB8674BCD2",
"versionEndExcluding": "6.0.2",
"versionStartIncluding": "6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Seokchan Yoon for reporting this issue."
}
],
"id": "CVE-2026-1285",
"lastModified": "2026-02-04T17:09:01.357",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-02-03T15:16:13.570",
"references": [
{
"source": "6a34fbeb-21d4-45e7-8e0a-62b95bc12c92",
"tags": [
"Vendor Advisory",
"Patch"
],
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"source": "6a34fbeb-21d4-45e7-8e0a-62b95bc12c92",
"tags": [
"Release Notes"
],
"url": "https://groups.google.com/g/django-announce"
},
{
"source": "6a34fbeb-21d4-45e7-8e0a-62b95bc12c92",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/"
}
],
"sourceIdentifier": "6a34fbeb-21d4-45e7-8e0a-62b95bc12c92",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-407"
}
],
"source": "6a34fbeb-21d4-45e7-8e0a-62b95bc12c92",
"type": "Secondary"
}
]
}
RHSA-2026:2694
Vulnerability from csaf_redhat - Published: 2026-02-12 22:32 - Updated: 2026-02-14 02:54Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A Subscription Management tool for finding and reporting Red Hat product usage",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Discovery, also known as Discovery, is an inspection and reporting tool that finds,\nidentifies, and reports environment data, or facts, such as the number of physical and virtual\nsystems on a network, their operating systems, and relevant configuration data stored within\nthem. Discovery also identifies and reports more detailed facts for some versions of key\nRed Hat packages and products that it finds in the network.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:2694",
"url": "https://access.redhat.com/errata/RHSA-2026:2694"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-13465",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-14550",
"url": "https://access.redhat.com/security/cve/CVE-2025-14550"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1207",
"url": "https://access.redhat.com/security/cve/CVE-2026-1207"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1285",
"url": "https://access.redhat.com/security/cve/CVE-2026-1285"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1287",
"url": "https://access.redhat.com/security/cve/CVE-2026-1287"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-1312",
"url": "https://access.redhat.com/security/cve/CVE-2026-1312"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-22029",
"url": "https://access.redhat.com/security/cve/CVE-2026-22029"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-24049",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-25639",
"url": "https://access.redhat.com/security/cve/CVE-2026-25639"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-26007",
"url": "https://access.redhat.com/security/cve/CVE-2026-26007"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery",
"url": "https://docs.redhat.com/en/documentation/subscription_central/1-latest/#Discovery"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_2694.json"
}
],
"title": "Red Hat Security Advisory: A Subscription Management tool for finding and reporting Red Hat product usage",
"tracking": {
"current_release_date": "2026-02-14T02:54:47+00:00",
"generator": {
"date": "2026-02-14T02:54:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.1"
}
},
"id": "RHSA-2026:2694",
"initial_release_date": "2026-02-12T22:32:47+00:00",
"revision_history": [
{
"date": "2026-02-12T22:32:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-02-12T22:32:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-02-14T02:54:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Discovery 2",
"product": {
"name": "Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:discovery:2::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Discovery"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"product": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-server-rhel9@sha256%3Af5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1770913597"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64",
"product": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64",
"product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-ui-rhel9@sha256%3A95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae?arch=amd64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1770913709"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"product": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"product_id": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-server-rhel9@sha256%3Acdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1770913597"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"product": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"product_id": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"product_identification_helper": {
"purl": "pkg:oci/discovery-ui-rhel9@sha256%3A2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4?arch=arm64\u0026repository_url=registry.redhat.io/discovery\u0026tag=1770913709"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64"
},
"product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
},
"product_reference": "registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64"
},
"product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"relates_to_product_reference": "Red Hat Discovery 2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64 as a component of Red Hat Discovery 2",
"product_id": "Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
},
"product_reference": "registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64",
"relates_to_product_reference": "Red Hat Discovery 2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13465",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"discovery_date": "2026-01-21T20:01:28.774829+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431740"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Lodash. A prototype pollution vulnerability in the _.unset and _.omit functions allows an attacker able to control property paths to delete methods from global prototypes. By removing essential functionalities, this can result in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lodash: prototype pollution in _.unset and _.omit functions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is only exploitable by applications using the _.unset and _.omit functions on an object and allowing user input to determine the path of the property to be removed. This issue only allows the deletion of properties but does not allow overwriting their behavior, limiting the impact to a denial of service. Due to this reason, this vulnerability has been rated with an important severity.\n\nIn Grafana, JavaScript code runs only in the browser, while the server side is all Golang. Therefore, the worst-case scenario is a loss of functionality in the client application inside the browser. To reflect this, the CVSS availability metric and the severity of the Grafana and the Grafana-PCP component have been updated to low and moderate, respectively.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-13465"
},
{
"category": "external",
"summary": "RHBZ#2431740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13465"
},
{
"category": "external",
"summary": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg",
"url": "https://github.com/lodash/lodash/security/advisories/GHSA-xxjr-mmjv-4gpg"
}
],
"release_date": "2026-01-21T19:05:28.846000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T22:32:47+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2694"
},
{
"category": "workaround",
"details": "To mitigate this issue, implement strict input validation before passing any property paths to the _.unset and _.omit functions to block attempts to access the prototype chain. Ensure that strings like __proto__, constructor and prototype are blocked, for example.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lodash: prototype pollution in _.unset and _.omit functions"
},
{
"cve": "CVE-2025-14550",
"cwe": {
"id": "CWE-167",
"name": "Improper Handling of Additional Special Element"
},
"discovery_date": "2026-02-03T15:01:12.970018+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2436341"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Django. A remote attacker can exploit this vulnerability by sending a crafted request containing multiple duplicate headers to the ASGIRequest component. This can lead to a potential Denial of Service (DoS), making the affected system unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Django: Django: Denial of Service via crafted request with duplicate headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This MODERATE impact denial-of-service flaw in Django affects Red Hat products utilizing the ASGIRequest component, such as Red Hat Ansible Automation Platform, Red Hat Discovery, and Red Hat Satellite. A remote attacker could send specially crafted requests containing duplicate headers, potentially rendering the affected system unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-14550"
},
{
"category": "external",
"summary": "RHBZ#2436341",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436341"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14550"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-14550",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14550"
},
{
"category": "external",
"summary": "https://docs.djangoproject.com/en/dev/releases/security/",
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"category": "external",
"summary": "https://groups.google.com/g/django-announce",
"url": "https://groups.google.com/g/django-announce"
},
{
"category": "external",
"summary": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/",
"url": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/"
}
],
"release_date": "2026-02-03T14:38:15.875000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T22:32:47+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2694"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Django: Django: Denial of Service via crafted request with duplicate headers"
},
{
"cve": "CVE-2026-1207",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2026-02-03T15:00:58.388707+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2436338"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Django. A remote attacker could inject SQL commands by manipulating the band index parameter during raster lookups on `RasterField` (only implemented on PostGIS). This SQL injection vulnerability could lead to unauthorized information disclosure, data alteration, or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Django: Django: SQL Injection via RasterField band index parameter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This IMPORTANT flaw affects Django\u0027s `RasterField` when utilized with PostGIS, allowing remote SQL injection via the band index parameter. Red Hat Ansible Automation Platform, Red Hat Discovery, Red Hat Satellite, Insights, and Ansible Services are impacted if configured to use Django with PostGIS `RasterField` lookups. Successful exploitation could lead to unauthorized data access, modification, or denial of service.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1207"
},
{
"category": "external",
"summary": "RHBZ#2436338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436338"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1207"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1207",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1207"
},
{
"category": "external",
"summary": "https://docs.djangoproject.com/en/dev/releases/security/",
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"category": "external",
"summary": "https://groups.google.com/g/django-announce",
"url": "https://groups.google.com/g/django-announce"
},
{
"category": "external",
"summary": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/",
"url": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/"
}
],
"release_date": "2026-02-03T14:35:33.721000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T22:32:47+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2694"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Django: Django: SQL Injection via RasterField band index parameter"
},
{
"cve": "CVE-2026-1285",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2026-02-03T15:01:06.283620+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2436340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Django. A remote attacker can exploit this vulnerability by providing crafted inputs containing a large number of unmatched HTML end tags to the `django.utils.text.Truncator.chars()` and `Truncator.words()` methods (when `html=True`), or through the `truncatechars_html` and `truncatewords_html` template filters. This can lead to a denial-of-service (DoS) condition, making the application unavailable to legitimate users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Django: Django: Denial of Service via crafted HTML inputs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is a MODERATE impact denial-of-service flaw in Django. Applications utilizing Django that process untrusted HTML inputs with a large number of unmatched end tags through the `Truncator.chars()` or `Truncator.words()` methods (with `html=True`), or the `truncatechars_html` and `truncatewords_html` template filters, may experience resource exhaustion. This can lead to the application becoming unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1285"
},
{
"category": "external",
"summary": "RHBZ#2436340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1285",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1285"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1285",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1285"
},
{
"category": "external",
"summary": "https://docs.djangoproject.com/en/dev/releases/security/",
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"category": "external",
"summary": "https://groups.google.com/g/django-announce",
"url": "https://groups.google.com/g/django-announce"
},
{
"category": "external",
"summary": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/",
"url": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/"
}
],
"release_date": "2026-02-03T14:35:50.254000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T22:32:47+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2694"
},
{
"category": "workaround",
"details": "To mitigate this issue, applications utilizing Django should avoid processing untrusted HTML content through the `django.utils.text.Truncator.chars()` and `Truncator.words()` methods with `html=True`, or the `truncatechars_html` and `truncatewords_html` template filters. Restrict the use of these functions to only trusted inputs where the HTML structure is controlled and validated.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Django: Django: Denial of Service via crafted HTML inputs"
},
{
"cve": "CVE-2026-1287",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2026-02-03T15:01:03.441713+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2436339"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Django. This vulnerability allows a remote attacker to perform SQL injection by using specially crafted control characters within column aliases. When these crafted aliases are passed through dictionary expansion to `QuerySet` methods like `annotate()` or `values()`, it can lead to the execution of arbitrary SQL commands. This could result in unauthorized access to sensitive data or modification of information within the database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Django: Django: SQL Injection via crafted column aliases",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This IMPORTANT SQL injection flaw in Django allows a remote attacker to execute arbitrary SQL commands by crafting column aliases. This vulnerability affects Red Hat products that incorporate Django, such as Red Hat Ansible Automation Platform, Red Hat Discovery, Red Hat Satellite, Insights, and Ansible Services, potentially leading to unauthorized data access or modification.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1287"
},
{
"category": "external",
"summary": "RHBZ#2436339",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436339"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1287",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1287"
},
{
"category": "external",
"summary": "https://docs.djangoproject.com/en/dev/releases/security/",
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"category": "external",
"summary": "https://groups.google.com/g/django-announce",
"url": "https://groups.google.com/g/django-announce"
},
{
"category": "external",
"summary": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/",
"url": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/"
}
],
"release_date": "2026-02-03T14:36:03.630000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T22:32:47+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2694"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Django: Django: SQL Injection via crafted column aliases"
},
{
"cve": "CVE-2026-1312",
"cwe": {
"id": "CWE-89",
"name": "Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)"
},
"discovery_date": "2026-02-03T15:01:18.274166+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2436342"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Django. A remote attacker could exploit a SQL injection vulnerability in the `.QuerySet.order_by()` method. This occurs when column aliases containing periods are used, and the same alias is also present in `FilteredRelation` via a specially crafted dictionary. Successful exploitation could lead to unauthorized information disclosure or arbitrary code execution within the database.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Django: Django: SQL injection via crafted column aliases in QuerySet.order_by()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This IMPORTANT vulnerability in Django allows for SQL injection within the `QuerySet.order_by()` method. A remote attacker could exploit this by providing crafted column aliases that include periods, specifically when used with `FilteredRelation`. Successful exploitation may result in unauthorized information disclosure or arbitrary code execution against the underlying database. This affects Red Hat products that integrate Django, such as Red Hat Ansible Automation Platform and Red Hat Satellite.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-1312"
},
{
"category": "external",
"summary": "RHBZ#2436342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2436342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-1312",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1312"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-1312",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1312"
},
{
"category": "external",
"summary": "https://docs.djangoproject.com/en/dev/releases/security/",
"url": "https://docs.djangoproject.com/en/dev/releases/security/"
},
{
"category": "external",
"summary": "https://groups.google.com/g/django-announce",
"url": "https://groups.google.com/g/django-announce"
},
{
"category": "external",
"summary": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/",
"url": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/"
}
],
"release_date": "2026-02-03T14:36:23.257000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T22:32:47+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2694"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "Django: Django: SQL injection via crafted column aliases in QuerySet.order_by()"
},
{
"cve": "CVE-2026-22029",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2026-01-10T04:01:03.694749+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2428412"
}
],
"notes": [
{
"category": "description",
"text": "React Router is a router for React. In @remix-run/router version prior to 1.23.2. and react-router 7.0.0 through 7.11.0, React Router (and Remix v1/v2) SPA open navigation redirects originating from loaders or actions in Framework Mode, Data Mode, or the unstable RSC modes can result in unsafe URLs causing unintended javascript execution on the client. This is only an issue if you are creating redirect paths from untrusted content or via an open redirect. There is no impact if Declarative Mode (\u003cBrowserRouter\u003e) is being used. This issue has been patched in @remix-run/router version 1.23.2 and react-router version 7.12.0.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-22029"
},
{
"category": "external",
"summary": "RHBZ#2428412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2428412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-22029",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22029"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-22029",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22029"
},
{
"category": "external",
"summary": "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx",
"url": "https://github.com/remix-run/react-router/security/advisories/GHSA-2w69-qvjg-hvjx"
}
],
"release_date": "2026-01-10T02:42:32.736000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T22:32:47+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2694"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "@remix-run/router: react-router: React Router vulnerable to XSS via Open Redirects"
},
{
"cve": "CVE-2026-24049",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-01-22T05:00:54.709179+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431959"
}
],
"notes": [
{
"category": "description",
"text": "wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "RHBZ#2431959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431959"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef",
"url": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/releases/tag/0.46.2",
"url": "https://github.com/pypa/wheel/releases/tag/0.46.2"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx",
"url": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx"
}
],
"release_date": "2026-01-22T04:02:08.706000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T22:32:47+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2694"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking"
},
{
"cve": "CVE-2026-25639",
"cwe": {
"id": "CWE-1287",
"name": "Improper Validation of Specified Type of Input"
},
"discovery_date": "2026-02-09T21:00:49.280114+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2438237"
}
],
"notes": [
{
"category": "description",
"text": "Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.13.5, the mergeConfig function in axios crashes with a TypeError when processing configuration objects containing __proto__ as an own property. An attacker can trigger this by providing a malicious configuration object created via JSON.parse(), causing complete denial of service. This vulnerability is fixed in 1.13.5.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios affected by Denial of Service via __proto__ Key in mergeConfig",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-25639"
},
{
"category": "external",
"summary": "RHBZ#2438237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2438237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-25639",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25639"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57",
"url": "https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.13.5",
"url": "https://github.com/axios/axios/releases/tag/v1.13.5"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-43fc-jf86-j433",
"url": "https://github.com/axios/axios/security/advisories/GHSA-43fc-jf86-j433"
}
],
"release_date": "2026-02-09T20:11:22.374000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T22:32:47+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2694"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "axios: Axios affected by Denial of Service via __proto__ Key in mergeConfig"
},
{
"cve": "CVE-2026-26007",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"discovery_date": "2026-02-10T22:01:01.036116+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2438762"
}
],
"notes": [
{
"category": "description",
"text": "cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to 46.0.5, the public_key_from_numbers (or EllipticCurvePublicNumbers.public_key()), EllipticCurvePublicNumbers.public_key(), load_der_public_key() and load_pem_public_key() functions do not verify that the point belongs to the expected prime-order subgroup of the curve. This missing validation allows an attacker to provide a public key point P from a small-order subgroup. This can lead to security issues in various situations, such as the most commonly used signature verification (ECDSA) and shared key negotiation (ECDH). When the victim computes the shared secret as S = [victim_private_key]P via ECDH, this leaks information about victim_private_key mod (small_subgroup_order). For curves with cofactor \u003e 1, this reveals the least significant bits of the private key. When these weak public keys are used in ECDSA , it\u0027s easy to forge signatures on the small subgroup. Only SECT curves are impacted by this. This vulnerability is fixed in 46.0.5.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cryptography: cryptography Subgroup Attack Due to Missing Subgroup Validation for SECT Curves",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"known_not_affected": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-26007"
},
{
"category": "external",
"summary": "RHBZ#2438762",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2438762"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-26007",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26007"
},
{
"category": "external",
"summary": "https://github.com/pyca/cryptography/commit/0eebb9dbb6343d9bc1d91e5a2482ed4e054a6d8c",
"url": "https://github.com/pyca/cryptography/commit/0eebb9dbb6343d9bc1d91e5a2482ed4e054a6d8c"
},
{
"category": "external",
"summary": "https://github.com/pyca/cryptography/security/advisories/GHSA-r6ph-v2qm-q3c2",
"url": "https://github.com/pyca/cryptography/security/advisories/GHSA-r6ph-v2qm-q3c2"
}
],
"release_date": "2026-02-10T21:42:56.471000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-12T22:32:47+00:00",
"details": "The containers required to run Discovery can be installed through discovery-installer\nRPM. See the official documentation for more details.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:2694"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:cdf9b1062c961f67ee4f5dd3e23b26420517f884a51d2034efacff6847d47b5f_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-server-rhel9@sha256:f5bc26180f20c635474f48fb7fb1aaf348fb3544db93cc23901ed3fb2662d3a8_amd64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:2ff9787699ff67dab7ee6f300d84651233f499aac8aeee10bfe21381806393c4_arm64",
"Red Hat Discovery 2:registry.redhat.io/discovery/discovery-ui-rhel9@sha256:95d6b321323773a5a465ef2e83aafd2937cb4b5fe48bd81c7f8996b3b52702ae_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cryptography: cryptography Subgroup Attack Due to Missing Subgroup Validation for SECT Curves"
}
]
}
WID-SEC-W-2026-0297
Vulnerability from csaf_certbund - Published: 2026-02-03 23:00 - Updated: 2026-02-04 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Django ist ein in Python geschriebenes serverseitiges Web-Framework, das einem Model-View-Presenter-Schema folgt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Django ausnutzen, um SQL-Injektionen durchzuf\u00fchren, vertrauliche Informationen offenzulegen oder einen Denial-of-Service-Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0297 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0297.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0297 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0297"
},
{
"category": "external",
"summary": "Django security releases vom 2026-02-03",
"url": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:0037-1 vom 2026-02-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WX42CFZ2AQTSZLBB3PTABNCVT24BY5LD/"
}
],
"source_lang": "en-US",
"title": "Django: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-02-04T23:00:00.000+00:00",
"generator": {
"date": "2026-02-05T09:40:44.516+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0297",
"initial_release_date": "2026-02-03T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-02-03T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von openSUSE aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.0.2",
"product": {
"name": "Open Source Django \u003c6.0.2",
"product_id": "T050499"
}
},
{
"category": "product_version",
"name": "6.0.2",
"product": {
"name": "Open Source Django 6.0.2",
"product_id": "T050499-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:djangoproject:django:6.0.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c5.2.11",
"product": {
"name": "Open Source Django \u003c5.2.11",
"product_id": "T050500"
}
},
{
"category": "product_version",
"name": "5.2.11",
"product": {
"name": "Open Source Django 5.2.11",
"product_id": "T050500-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:djangoproject:django:5.2.11"
}
}
},
{
"category": "product_version_range",
"name": "\u003c4.2.28",
"product": {
"name": "Open Source Django \u003c4.2.28",
"product_id": "T050501"
}
},
{
"category": "product_version",
"name": "4.2.28",
"product": {
"name": "Open Source Django 4.2.28",
"product_id": "T050501-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:djangoproject:django:4.2.28"
}
}
}
],
"category": "product_name",
"name": "Django"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13473",
"product_status": {
"known_affected": [
"T027843",
"T050499",
"T050501",
"T050500"
]
},
"release_date": "2026-02-03T23:00:00.000+00:00",
"title": "CVE-2025-13473"
},
{
"cve": "CVE-2026-1207",
"product_status": {
"known_affected": [
"T027843",
"T050499",
"T050501",
"T050500"
]
},
"release_date": "2026-02-03T23:00:00.000+00:00",
"title": "CVE-2026-1207"
},
{
"cve": "CVE-2026-1287",
"product_status": {
"known_affected": [
"T027843",
"T050499",
"T050501",
"T050500"
]
},
"release_date": "2026-02-03T23:00:00.000+00:00",
"title": "CVE-2026-1287"
},
{
"cve": "CVE-2026-1312",
"product_status": {
"known_affected": [
"T027843",
"T050499",
"T050501",
"T050500"
]
},
"release_date": "2026-02-03T23:00:00.000+00:00",
"title": "CVE-2026-1312"
},
{
"cve": "CVE-2025-14550",
"product_status": {
"known_affected": [
"T027843",
"T050499",
"T050501",
"T050500"
]
},
"release_date": "2026-02-03T23:00:00.000+00:00",
"title": "CVE-2025-14550"
},
{
"cve": "CVE-2026-1285",
"product_status": {
"known_affected": [
"T027843",
"T050499",
"T050501",
"T050500"
]
},
"release_date": "2026-02-03T23:00:00.000+00:00",
"title": "CVE-2026-1285"
}
]
}
GHSA-4RRR-2H4V-F3J9
Vulnerability from github – Published: 2026-02-03 15:30 – Updated: 2026-02-03 19:31An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
django.utils.text.Truncator.chars() and Truncator.words() methods (with html=True) and the truncatechars_html and truncatewords_html template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Seokchan Yoon for reporting this issue.
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "Django"
},
"ranges": [
{
"events": [
{
"introduced": "6.0a1"
},
{
"fixed": "6.0.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "Django"
},
"ranges": [
{
"events": [
{
"introduced": "5.2a1"
},
{
"fixed": "5.2.11"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "Django"
},
"ranges": [
{
"events": [
{
"introduced": "4.2a1"
},
{
"fixed": "4.2.28"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2026-1285"
],
"database_specific": {
"cwe_ids": [
"CWE-407"
],
"github_reviewed": true,
"github_reviewed_at": "2026-02-03T19:31:15Z",
"nvd_published_at": "2026-02-03T15:16:13Z",
"severity": "LOW"
},
"details": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n\n`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\n\nDjango would like to thank Seokchan Yoon for reporting this issue.",
"id": "GHSA-4rrr-2h4v-f3j9",
"modified": "2026-02-03T19:31:15Z",
"published": "2026-02-03T15:30:23Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1285"
},
{
"type": "WEB",
"url": "https://github.com/django/django/commit/a33540b3e20b5d759aa8b2e4b9ca0e8edd285344"
},
{
"type": "WEB",
"url": "https://docs.djangoproject.com/en/dev/releases/security"
},
{
"type": "PACKAGE",
"url": "https://github.com/django/django"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/django-announce"
},
{
"type": "WEB",
"url": "https://www.djangoproject.com/weblog/2026/feb/03/security-releases"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U",
"type": "CVSS_V4"
}
],
"summary": "Django has Inefficient Algorithmic Complexity"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.