Skip to content

Update dependency django to v6.0.4 [SECURITY] - autoclosed#77

Closed
renovate[bot] wants to merge 1 commit intomainfrom
renovate/pypi-django-vulnerability
Closed

Update dependency django to v6.0.4 [SECURITY] - autoclosed#77
renovate[bot] wants to merge 1 commit intomainfrom
renovate/pypi-django-vulnerability

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented Mar 4, 2026

This PR contains the following updates:

Package Change Age Confidence
django (changelog) ==6.0.2==6.0.4 age confidence

Django vulnerable to Uncontrolled Resource Consumption

CVE-2026-25673 / GHSA-8p8v-wh79-9r56

More information

Details

An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29.

URLField.to_python() in Django calls urllib.parse.urlsplit(), which performs NFKC normalization on Windows that is disproportionately slow for certain Unicode characters, allowing a remote attacker to cause denial of service via large URL inputs containing these characters.

Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Seokchan Yoon for reporting this issue.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Django has a Race Condition vulnerability

CVE-2026-25674 / GHSA-mjgh-79qc-68w3

More information

Details

An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29.

Race condition in file-system storage and file-based cache backends in Django allows an attacker to cause file system objects to be created with incorrect permissions via concurrent requests, where one thread's temporary umask change affects other threads in multi-threaded environments.

Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Tarek Nakkouch for reporting this issue.

Severity

  • CVSS Score: 3.7 / 10 (Low)
  • Vector String: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Django: SGI requests with a missing or understated Content-Length header could bypass the DATA_UPLOAD_MAX_MEMORY_SIZE limit

CVE-2026-33034 / GHSA-933h-hp56-hf7m

More information

Details

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. ASGI requests with a missing or understated Content-Length header could bypass the DATA_UPLOAD_MAX_MEMORY_SIZE limit when reading HttpRequest.body, allowing remote attackers to load an unbounded request body into memory.

Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Superior for reporting this issue.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Django has potential DoS via MultiPartParser through crafted multipart uploads

CVE-2026-33033 / GHSA-5mf9-h53q-7mhq

More information

Details

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. MultiPartParser allows remote attackers to degrade performance by submitting multipart uploads with Content-Transfer-Encoding: base64 including excessive whitespace.

Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Seokchan Yoon for reporting this issue.

Severity

  • CVSS Score: 6.5 / 10 (Medium)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Django vulnerable to ASGI header spoofing via underscore/hyphen conflation

CVE-2026-3902 / GHSA-mvfq-ggxm-9mc5

More information

Details

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. ASGIRequest allows a remote attacker to spoof headers by exploiting an ambiguous mapping of two header variants (with hyphens or with underscores) to a single version with underscores.

Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Tarek Nakkouch for reporting this issue.

Severity

  • CVSS Score: 7.5 / 10 (High)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Django vulnerable to privilege abuse in ModelAdmin.list_editable

CVE-2026-4292 / GHSA-mmwr-2jhp-mc7j

More information

Details

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. Admin changelist forms using ModelAdmin.list_editable incorrectly allowed new instances to be created via forged POST data.

Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Cantina for reporting this issue.

Severity

  • CVSS Score: 2.7 / 10 (Low)
  • Vector String: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Django vulnerable to privilege abuse in GenericInlineModelAdmin

CVE-2026-4277 / GHSA-pwjp-ccjc-ghwg

More information

Details

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. Add permissions on inline model instances were not validated on submission of forged POST data in GenericInlineModelAdmin.

Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank N05ec@LZU-DSLab for reporting this issue.

Severity

  • CVSS Score: 2.3 / 10 (Low)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

References

This data is provided by the GitHub Advisory Database (CC-BY 4.0).


Release Notes

django/django (django)

v6.0.4

Compare Source

v6.0.3

Compare Source


Configuration

📅 Schedule: (UTC)

  • Branch creation
    • ""
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Enabled.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot requested a review from a team as a code owner March 4, 2026 21:22
@renovate renovate Bot requested review from f-atwi and swetha1654 and removed request for a team March 4, 2026 21:22
@renovate renovate Bot enabled auto-merge (squash) March 4, 2026 21:22
@renovate renovate Bot changed the title chore(deps): update dependency django to v6.0.3 [security] chore(deps): update dependency django to v6.0.3 [security] - autoclosed Mar 27, 2026
@renovate renovate Bot closed this Mar 27, 2026
auto-merge was automatically disabled March 27, 2026 03:29

Pull request was closed

@renovate renovate Bot deleted the renovate/pypi-django-vulnerability branch March 27, 2026 03:29
@renovate renovate Bot changed the title chore(deps): update dependency django to v6.0.3 [security] - autoclosed chore(deps): update dependency django to v6.0.3 [security] Mar 30, 2026
@renovate renovate Bot reopened this Mar 30, 2026
@renovate renovate Bot force-pushed the renovate/pypi-django-vulnerability branch 2 times, most recently from 7fc1bfc to fbceb4b Compare March 30, 2026 20:06
@renovate renovate Bot enabled auto-merge (squash) April 3, 2026 09:34
@renovate renovate Bot force-pushed the renovate/pypi-django-vulnerability branch from fbceb4b to 7b1504e Compare April 3, 2026 09:34
@renovate renovate Bot changed the title chore(deps): update dependency django to v6.0.3 [security] Update dependency django to v6.0.4 [SECURITY] Apr 8, 2026
@renovate renovate Bot force-pushed the renovate/pypi-django-vulnerability branch from 7b1504e to 65bfa4e Compare April 8, 2026 15:41
@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented Apr 8, 2026

Test results for commit 65bfa4e

Test coverage for 65bfa4e

Name           Stmts   Miss Branch BrPart  Cover   Missing
----------------------------------------------------------
src/charm.py      54      9      2      1    82%   72-78, 99-101, 114-116
src/state.py      85      1     16      1    98%   204
----------------------------------------------------------
TOTAL            139     10     18      2    92%

Static code analysis report

Run started:2026-04-08 15:44:19.234899+00:00

Test results:
  No issues identified.

Code scanned:
  Total lines of code: 975
  Total lines skipped (#nosec): 0
  Total potential issues skipped due to specifically being disabled (e.g., #nosec BXXX): 0

Run metrics:
  Total issues (by severity):
  	Undefined: 0
  	Low: 0
  	Medium: 0
  	High: 0
  Total issues (by confidence):
  	Undefined: 0
  	Low: 0
  	Medium: 0
  	High: 0
Files skipped (0):

@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented Apr 8, 2026

Test results for commit 65bfa4e

Test coverage for 65bfa4e

Name            Stmts   Miss Branch BrPart  Cover   Missing
-----------------------------------------------------------
src/charm.py      140     31     36     14    73%   103-106, 111-112, 116, 123-125, 130->136, 135, 138, 149-150, 152, 154->160, 159, 165-166, 173-176, 209-210, 231, 237, 240, 255-278
src/policy.py      98     68     20      0    25%   24-26, 31, 40-44, 55, 72-76, 89-103, 133-134, 142, 175-196, 219-238, 249-257, 265-271, 279-284, 295-298
src/relay.py      142      8     46      2    95%   155->178, 252-268, 398-401
src/timer.py       11      4      0      0    64%   48-61
-----------------------------------------------------------
TOTAL             391    111    102     16    70%

Static code analysis report

Run started:2026-04-08 15:44:37.266109+00:00

Test results:
  No issues identified.

Code scanned:
  Total lines of code: 1810
  Total lines skipped (#nosec): 6
  Total potential issues skipped due to specifically being disabled (e.g., #nosec BXXX): 1

Run metrics:
  Total issues (by severity):
  	Undefined: 0
  	Low: 0
  	Medium: 0
  	High: 0
  Total issues (by confidence):
  	Undefined: 0
  	Low: 0
  	Medium: 0
  	High: 0
Files skipped (0):

@github-actions
Copy link
Copy Markdown
Contributor

github-actions Bot commented Apr 8, 2026

Test results for commit 65bfa4e

Test coverage for 65bfa4e

Name           Stmts   Miss Branch BrPart  Cover   Missing
----------------------------------------------------------
src/charm.py     176     36     38      8    78%   67-69, 76-77, 81, 94, 97-98, 128, 170-200, 213->228, 221-227, 353-367
src/squid.py     110      6     34      5    92%   65, 75, 175, 264, 313, 322, 344->351, 346->348
----------------------------------------------------------
TOTAL            286     42     72     13    84%

Static code analysis report

Run started:2026-04-08 15:44:12.073068+00:00

Test results:
  No issues identified.

Code scanned:
  Total lines of code: 2243
  Total lines skipped (#nosec): 1
  Total potential issues skipped due to specifically being disabled (e.g., #nosec BXXX): 1

Run metrics:
  Total issues (by severity):
  	Undefined: 0
  	Low: 0
  	Medium: 0
  	High: 0
  Total issues (by confidence):
  	Undefined: 0
  	Low: 0
  	Medium: 0
  	High: 0
Files skipped (0):

@renovate renovate Bot changed the title Update dependency django to v6.0.4 [SECURITY] Update dependency django to v6.0.4 [SECURITY] - autoclosed Apr 22, 2026
@renovate renovate Bot closed this Apr 22, 2026
auto-merge was automatically disabled April 22, 2026 05:41

Pull request was closed

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants