Impact
A flaw in liangliangyy DjangoBlog versions up to 2.1.0.0 allows an attacker to read or alter the hard‑coded SECRET_KEY value in settings.py. The hard‑coded credential can be used by an attacker to influence Django’s signing mechanism, potentially enabling the creation of valid session or token values. The CVSS score of 6.3 indicates a moderate severity for this credential exposure.
Affected Systems
The vulnerability affects the liangliangyy DjangoBlog product, all releases up to and including 2.1.0.0. It resides in the settings.py file within the setting handler component of the application.
Risk and Exploitability
The attack can be launched remotely by manipulating the argument that controls SECRET_KEY, but the CVE notes that exploitation requires a high level of complexity and is considered difficult. EPSS data is not available, and the vulnerability is not listed in the CISA KEV catalog. The availability of the exploit code in public repositories increases the risk for any exposed deployment.
OpenCVE Enrichment