{"schema_version":"1.7.2","id":"OESA-2025-2379","modified":"2025-10-11T13:20:17Z","published":"2025-10-11T13:20:17Z","upstream":["CVE-2025-59681","CVE-2025-59682"],"summary":"python-django security update","details":"A high-level Python Web framework that encourages rapid development and clean, pragmatic design.\r\n\r\nSecurity Fix(es):\n\nAn issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. QuerySet.annotate(), QuerySet.alias(), QuerySet.aggregate(), and QuerySet.extra() are subject to SQL injection in column aliases, when using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to these methods on MySQL and MariaDB.(CVE-2025-59681)\n\nA critical vulnerability was found in Django up to 4.2.24/5.1.12/5.2.6. Using CWE to declare the problem leads to CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Impacted is confidentiality, integrity, and availability. Upgrading to version 4.2.25, 5.1.13 or 5.2.7 eliminates this vulnerability.(CVE-2025-59682)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS","name":"python-django","purl":"pkg:rpm/openEuler/python-django&distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.2.15-9.oe2403"}]}],"ecosystem_specific":{"noarch":["python-django-help-4.2.15-9.oe2403.noarch.rpm","python3-Django-4.2.15-9.oe2403.noarch.rpm"],"src":["python-django-4.2.15-9.oe2403.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2379"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-59681"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-59682"}],"database_specific":{"severity":"Critical"}}
