Vulnerability Description
An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the "startapp --template" and "startproject --template" commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Djangoproject | Django | >= 4.2.0, < 4.2.25 |
Related Weaknesses (CWE)
References
- https://docs.djangoproject.com/en/dev/releases/security/Vendor Advisory
- https://groups.google.com/g/django-announceRelease NotesVendor Advisory
- https://www.djangoproject.com/weblog/2025/oct/01/security-releases/Release NotesVendor Advisory
- http://www.openwall.com/lists/oss-security/2025/10/01/3
FAQ
What is CVE-2025-59682?
CVE-2025-59682 is a vulnerability with a CVSS score of 3.1 (LOW). An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the "startapp --template" and "startproject --templat...
How severe is CVE-2025-59682?
CVE-2025-59682 has been rated LOW with a CVSS base score of 3.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-59682?
Check the references section above for vendor advisories and patch information. Affected products include: Djangoproject Django.