CVE-2025-64459

An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The methods `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()`, and the class `Q()`, are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the `_connector` argument. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank cyberstan for reporting this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-11-05 15:15

Updated : 2025-11-10 18:25


NVD link : CVE-2025-64459

Mitre link : CVE-2025-64459

CVE.ORG link : CVE-2025-64459


JSON object : View

Products Affected

djangoproject

  • django
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')