An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8.
The methods `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()`, and the class `Q()`, are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the `_connector` argument.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank cyberstan for reporting this issue.
References
| Link | Resource |
|---|---|
| https://docs.djangoproject.com/en/dev/releases/security/ | Vendor Advisory |
| https://groups.google.com/g/django-announce | Mailing List |
| https://www.djangoproject.com/weblog/2025/nov/05/security-releases/ | Vendor Advisory |
| https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-64459.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
10 Nov 2025, 18:25
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Djangoproject django
Djangoproject |
|
| CPE | cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* | |
| References | () https://docs.djangoproject.com/en/dev/releases/security/ - Vendor Advisory | |
| References | () https://groups.google.com/g/django-announce - Mailing List | |
| References | () https://www.djangoproject.com/weblog/2025/nov/05/security-releases/ - Vendor Advisory | |
| References | () https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-64459.html - Exploit, Third Party Advisory |
08 Nov 2025, 13:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
06 Nov 2025, 19:45
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-05 15:15
Updated : 2025-11-10 18:25
NVD link : CVE-2025-64459
Mitre link : CVE-2025-64459
CVE.ORG link : CVE-2025-64459
JSON object : View
Products Affected
djangoproject
- django
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
