CVE-2025-48432

EUVD-2025-16951
An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4 MEDIUM
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
mitreCNA
4 MEDIUM
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
Affected Products (NVD)
VendorProductVersion
djangoprojectdjango
4.2 ≤
𝑥
< 4.2.23
djangoprojectdjango
5.1 ≤
𝑥
< 5.1.11
djangoprojectdjango
5.2 ≤
𝑥
< 5.2.3
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
python-django
bookworm
vulnerable
bookworm (security)
3:3.2.25-0+deb12u2
fixed
bullseye
vulnerable
bullseye (security)
2:2.2.28-1~deb11u12
fixed
forky
3:4.2.28-1
fixed
sid
3:4.2.29-1
fixed
trixie
3:4.2.23-1
fixed
trixie (security)
3:4.2.28-0+deb13u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
python-django
bionic
needs-triage
focal
Fixed 2:2.2.12-1ubuntu0.29+esm2
released
jammy
Fixed 2:3.2.12-2ubuntu1.20
released
noble
Fixed 3:4.2.11-1ubuntu1.9
released
oracular
Fixed 3:4.2.15-1ubuntu1.6
released
plucky
Fixed 3:4.2.18-1ubuntu1.3
released
questing
Fixed 3:5.2.4-1
released
trusty
needs-triage
xenial
needs-triage