djangorestframework@3.6.0 vulnerabilities

Web APIs for Django, made easy.

Direct Vulnerabilities

Known vulnerabilities in the djangorestframework package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • M
Cross-site Scripting (XSS)

djangorestframework is a powerful and flexible toolkit for building Web APIs.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via the break_long_headers template filter due to improper input sanitization before splitting and joining with <br> tags.

How to fix Cross-site Scripting (XSS)?

Upgrade djangorestframework to version 3.15.2 or higher.

[,3.15.2)
  • M
Cross-site Scripting (XSS)

djangorestframework is a powerful and flexible toolkit for building Web APIs.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS). When using the browseable API viewer, Django REST Framework fails to properly escape certain strings that can come from user input. This allows a user who can control those strings to inject malicious <script> tags.

How to fix Cross-site Scripting (XSS)?

Upgrade djangorestframework to version 3.11.2 or higher.

[,3.11.2)
  • M
Cross-site Scripting (XSS)

djangorestframework is a powerful and flexible toolkit for building Web APIs.

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) due to disabled autoescaping in the default DRF Browsable API view templates.

How to fix Cross-site Scripting (XSS)?

Upgrade djangorestframework to version 3.9.1 or higher.

[,3.9.1)