CVE-2025-64458
BaseFortify
Publication date: 2025-11-05
Last updated on: 2025-11-10
Assigner: Django Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| djangoproject | django | From 4.2 (inc) to 4.2.26 (exc) |
| djangoproject | django | From 5.1 (inc) to 5.1.14 (exc) |
| djangoproject | django | From 5.2 (inc) to 5.2.8 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-407 | An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to slow NFKC normalization in Python on Windows, which affects certain Django HTTP redirect functions. Specifically, django.http.HttpResponseRedirect, django.http.HttpResponsePermanentRedirect, and django.shortcuts.redirect can be exploited by inputs containing a very large number of Unicode characters, potentially causing a denial-of-service (DoS) attack.
How can this vulnerability impact me? :
The vulnerability can lead to a denial-of-service (DoS) condition by causing the affected Django redirect functions to process inputs with many Unicode characters very slowly, potentially making the application unresponsive or degraded in performance.
What immediate steps should I take to mitigate this vulnerability?
Upgrade Django to version 5.1.14 or later, 4.2.26 or later, or 5.2.8 or later to address the NFKC normalization performance issue that can lead to denial-of-service attacks. Avoid using affected versions (5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8) and consider patching or updating unsupported earlier series if possible.