← Volver a CVEs
CVE-2025-13473
MEDIUM5.3
Descripcion
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.
Detalles CVE
Puntuacion CVSS v3.15.3
SeveridadMEDIUM
Vector CVSSCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Vector de ataqueNETWORK
ComplejidadHIGH
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado2/3/2026
Ultima modificacion2/4/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
djangoproject:django
Debilidades (CWE)
CWE-208
Referencias
https://docs.djangoproject.com/en/dev/releases/security/(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)
https://groups.google.com/g/django-announce(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)
https://www.djangoproject.com/weblog/2026/feb/03/security-releases/(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.