Vulnerability Description
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The methods `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()`, and the class `Q()`, are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the `_connector` argument. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank cyberstan for reporting this issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Djangoproject | Django | >= 4.2, < 4.2.26 |
Related Weaknesses (CWE)
References
- https://docs.djangoproject.com/en/dev/releases/security/Vendor Advisory
- https://groups.google.com/g/django-announceMailing List
- https://www.djangoproject.com/weblog/2025/nov/05/security-releases/Vendor Advisory
- https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-6ExploitThird Party Advisory
FAQ
What is CVE-2025-64459?
CVE-2025-64459 is a vulnerability with a CVSS score of 9.1 (CRITICAL). An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The methods `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()`, and the class `Q()`, are subject to ...
How severe is CVE-2025-64459?
CVE-2025-64459 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-64459?
Check the references section above for vendor advisories and patch information. Affected products include: Djangoproject Django.