CVE-2025-64459 Affecting python-django package, versions <2:2.2.12-1ubuntu0.29+esm5


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU2004-PYTHONDJANGO-13842463
  • published6 Nov 2025
  • disclosed5 Nov 2025

Introduced: 5 Nov 2025

NewCVE-2025-64459  (opens in a new tab)

How to fix?

Upgrade Ubuntu:20.04 python-django to version 2:2.2.12-1ubuntu0.29+esm5 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python-django package and not the python-django package as distributed by Ubuntu. See How to fix? for Ubuntu:20.04 relevant fixed versions and status.

An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The methods QuerySet.filter(), QuerySet.exclude(), and QuerySet.get(), and the class Q(), are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the _connector argument. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank cyberstan for reporting this issue.

CVSS Base Scores

version 3.1