PT-2025-45119 · Django +4 · Django +4
Cyberstan
+2
·
Published
2025-11-05
·
Updated
2026-01-24
·
CVE-2025-64459
CVSS v2.0
9.4
9.4
Critical
| Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:N |
Name of the Vulnerable Software and Affected Versions
Django versions prior to 5.1.14
Django versions prior to 5.2.8
Django versions prior to 4.2.26
Django 6.0 (beta)
Versions 5.0.x, 4.1.x, and 3.2.x
Description
Django is affected by a SQL injection issue within the
QuerySet.filter(), QuerySet.exclude(), QuerySet.get(), and Q() methods. This occurs when using a dictionary with dictionary expansion, specifically when the connector argument is crafted maliciously. The vulnerability allows for manipulation of query logic, potentially enabling unauthorized access, data exfiltration, and privilege escalation. An attacker can inject parameters like connector to alter query behavior (e.g., changing AND to OR). The vulnerability is exploitable without authentication. Approximately 80,000 GitHub stars are associated with the affected framework.Recommendations
Update to Django version 5.2.8 or later.
Update to Django version 5.1.14 or later.
Update to Django version 4.2.26 or later.
Audit code for usages of
QuerySet.filter(), QuerySet.exclude(), and QuerySet.get() and the Q() class.
Never pass request.GET.dict() directly into QuerySet methods.
Implement input validation using Django Forms.
Implement whitelisting of filter parameters.
Explicitly map fields instead of using dictionary expansion.
Check logs for the presence of the connector and negated parameters in requests.Exploit
Fix
DoS
SQL injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-13913
BIT-DJANGO-2025-64459
CVE-2025-64459
DLA-4425-1
GHSA-FRMV-PR5F-9MCR
MGASA-2025-0292
OESA-2025-2676
OESA-2025-2677
OESA-2025-2678
OESA-2025-2679
OESA-2025-2680
USN-7859-1
Affected Products
Debian
Django
Linuxmint
Red Os
Ubuntu
References · 87
- 🔥 https://github.com/omarkurt/django-connector-CVE-2025-64459-testbed⭐ 1 · Exploit
- 🔥 https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-64459.html · Exploit
- https://advisories.mageia.org/MGASA-2025-0292.html · Security Note
- https://osv.dev/vulnerability/UBUNTU-CVE-2025-64459 · Vendor Advisory
- https://osv.dev/vulnerability/OESA-2025-2679 · Vendor Advisory
- https://ubuntu.com/security/notices/USN-7859-1 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2025-64459 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-64458 · Security Note
- https://cve.org/CVERecord?id=CVE-2025-64459 · Security Note
- https://osv.dev/vulnerability/OESA-2025-2678 · Vendor Advisory
- https://ubuntu.com/security/CVE-2025-64459 · Vendor Advisory
- https://osv.dev/vulnerability/OESA-2025-2680 · Vendor Advisory
- https://osv.dev/vulnerability/OESA-2025-2677 · Vendor Advisory
- https://osv.dev/vulnerability/OESA-2025-2676 · Vendor Advisory
- https://osv.dev/vulnerability/BIT-django-2025-64459 · Vendor Advisory