{"schema_version":"1.7.2","id":"OESA-2025-2680","modified":"2025-11-14T12:39:10Z","published":"2025-11-14T12:39:10Z","upstream":["CVE-2025-64458","CVE-2025-64459"],"summary":"python-django security update","details":"A high-level Python Web framework that encourages rapid development and clean, pragmatic design.\r\n\r\nSecurity Fix(es):\n\nAn issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8.\nNFKC normalization in Python is slow on Windows. As a consequence, `django.http.HttpResponseRedirect`, `django.http.HttpResponsePermanentRedirect`, and the shortcut `django.shortcuts.redirect`  were subject to a potential  denial-of-service attack via certain inputs with a very large number of Unicode characters.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Seokchan Yoon for reporting this issue.(CVE-2025-64458)\n\nAn issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8.\nThe methods `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()`, and the class `Q()`, are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the `_connector` argument.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank cyberstan for reporting this issue.(CVE-2025-64459)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"python-django","purl":"pkg:rpm/openEuler/python-django&distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.2.15-10.oe2203sp4"}]}],"ecosystem_specific":{"noarch":["python-django-help-4.2.15-10.oe2203sp4.noarch.rpm","python3-Django-4.2.15-10.oe2203sp4.noarch.rpm"],"src":["python-django-4.2.15-10.oe2203sp4.src.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2680"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-64458"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-64459"}],"database_specific":{"severity":"Critical"}}
