TROYANOSYVIRUS
Retour aux CVEs

CVE-2025-13473

MEDIUM
5.3

Description

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.

Details CVE

Score CVSS v3.15.3
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Vecteur d'attaqueNETWORK
ComplexiteHIGH
Privileges requisLOW
Interaction utilisateurNONE
Publie2/3/2026
Derniere modification2/4/2026
Sourcenvd
Observations honeypot0

Produits affectes

djangoproject:django

Faiblesses (CWE)

CWE-208

References

https://docs.djangoproject.com/en/dev/releases/security/(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)
https://groups.google.com/g/django-announce(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.