← Voltar para CVEs
CVE-2025-13473
MEDIUM5.3
Descricao
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.
Detalhes CVE
Pontuacao CVSS v3.15.3
SeveridadeMEDIUM
Vetor CVSSCVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Vetor de ataqueNETWORK
ComplexidadeHIGH
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado2/3/2026
Ultima modificacao2/4/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
djangoproject:django
Fraquezas (CWE)
CWE-208
Referencias
https://docs.djangoproject.com/en/dev/releases/security/(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)
https://groups.google.com/g/django-announce(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)
https://www.djangoproject.com/weblog/2026/feb/03/security-releases/(6a34fbeb-21d4-45e7-8e0a-62b95bc12c92)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.