CVE-2026-4277
Permission Bypass in Django GenericInlineModelAdmin via Forged POST Data
Publication date: 2026-04-07
Last updated on: 2026-04-13
Assigner: Django Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| djangoproject | django | From 4.2 (inc) to 4.2.30 (exc) |
| djangoproject | django | From 5.2 (inc) to 5.2.13 (exc) |
| djangoproject | django | From 6.0 (inc) to 6.0.4 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in certain versions of Django before 6.0.4, 5.2.13, and 4.2.30. It involves a failure to validate add permissions on inline model instances when forged POST data is submitted in the GenericInlineModelAdmin component.
Because of this, an attacker could potentially submit unauthorized data through inline model forms, bypassing permission checks that should normally prevent such actions.
How can this vulnerability impact me? :
The impact of this vulnerability is that unauthorized users might be able to add or modify inline model instances in a Django application by submitting forged POST requests.
This could lead to unauthorized data manipulation, potentially compromising the integrity of the application's data and possibly allowing privilege escalation or other malicious activities.