← Retour aux CVEs
CVE-2025-13473
MEDIUM5.3
Description
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.
Details CVE
Score CVSS v3.15.3
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisLOW
Interaction utilisateurNONE
Publie2/3/2026
Derniere modification2/4/2026
Sourcenvd
Observations honeypot0
Produits affectes
djangoproject:django
Faiblesses (CWE)
CWE-208
References
https://docs.djangoproject.com/en/dev/releases/security/(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)
https://groups.google.com/g/django-announce(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)
https://www.djangoproject.com/weblog/2026/feb/03/security-releases/(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.