
We found results for “”
CVE-2025-48432
Good to know:

Date: June 4, 2025
An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems.
Severity Score
Related Resources (15)
Severity Score
Weakness Type (CWE)
Improper Output Neutralization for Logs
CWE-117Top Fix

Upgrade Version
Upgrade to version Django - 5.2.2;Django - 5.1.10;Django - 4.2.22;Django - 5.1.10;Django - 4.2.22;Django - 5.2.2;https://github.com/django/django.git - 5.2.2;https://github.com/django/django.git - 5.1.10;https://github.com/django/django.git - 4.2.22
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | CHANGED |
Confidentiality (C): | NONE |
Integrity (I): | LOW |
Availability (A): | NONE |