We found results for “”
CVE-2025-13473
Good to know:
Date: February 3, 2026
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The "django.contrib.auth.handlers.modwsgi.check_password()" function for authentication via "mod_wsgi" allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.
Severity Score
Related Resources (8)
Severity Score
Weakness Type (CWE)
Observable Timing Discrepancy
CWE-208Top Fix
Upgrade Version
Upgrade to version django - 6.0.2;django - 5.2.11;django - 4.2.28;django - 6.0.2;https://github.com/django/django.git - 6.0.2;https://github.com/django/django.git - 5.2.11;https://github.com/django/django.git - 4.2.28
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


