An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems.
History

Tue, 10 Jun 2025 18:30:00 +0000

Type Values Removed Values Added
References

Tue, 10 Jun 2025 17:45:00 +0000


Tue, 10 Jun 2025 17:15:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 before 4.2.22. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems. An issue was discovered in Django 5.2 before 5.2.3, 5.1 before 5.1.11, and 4.2 before 4.2.23. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems.
References

Fri, 06 Jun 2025 19:00:00 +0000

Type Values Removed Values Added
Title django: Django Path Injection Vulnerability
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 05 Jun 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Jun 2025 03:45:00 +0000

Type Values Removed Values Added
References

Thu, 05 Jun 2025 02:30:00 +0000

Type Values Removed Values Added
Description An issue was discovered in Django 5.2 before 5.2.2, 5.1 before 5.1.10, and 4.2 before 4.2.22. Internal HTTP response logging does not escape request.path, which allows remote attackers to potentially manipulate log output via crafted URLs. This may lead to log injection or forgery when logs are viewed in terminals or processed by external systems.
Weaknesses CWE-117
References
Metrics cvssV3_1

{'score': 4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-06-11T14:59:01.028Z

Reserved: 2025-05-21T00:00:00.000Z

Link: CVE-2025-48432

cve-icon Vulnrichment

Updated: 2025-06-10T18:03:40.110Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-05T03:15:25.563

Modified: 2025-06-10T18:15:32.790

Link: CVE-2025-48432

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-06-05T00:00:00Z

Links: CVE-2025-48432 - Bugzilla