CVE-2025-64458
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-05

Last updated on: 2025-11-10

Assigner: Django Software Foundation

Description
An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. NFKC normalization in Python is slow on Windows. As a consequence, `django.http.HttpResponseRedirect`, `django.http.HttpResponsePermanentRedirect`, and the shortcut `django.shortcuts.redirect` were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-05
Last Modified
2025-11-10
Generated
2026-05-06
AI Q&A
2025-11-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
djangoproject django From 4.2 (inc) to 4.2.26 (exc)
djangoproject django From 5.1 (inc) to 5.1.14 (exc)
djangoproject django From 5.2 (inc) to 5.2.8 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-407 An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is related to slow NFKC normalization in Python on Windows, which affects certain Django HTTP redirect functions. Specifically, django.http.HttpResponseRedirect, django.http.HttpResponsePermanentRedirect, and django.shortcuts.redirect can be exploited by inputs containing a very large number of Unicode characters, potentially causing a denial-of-service (DoS) attack.


How can this vulnerability impact me? :

The vulnerability can lead to a denial-of-service (DoS) condition by causing the affected Django redirect functions to process inputs with many Unicode characters very slowly, potentially making the application unresponsive or degraded in performance.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Django to version 5.1.14 or later, 4.2.26 or later, or 5.2.8 or later to address the NFKC normalization performance issue that can lead to denial-of-service attacks. Avoid using affected versions (5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8) and consider patching or updating unsupported earlier series if possible.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart