Impact
The vulnerability lies in Django’s UpdateCacheMiddleware, which mistakenly caches responses that include a Vary header with an asterisk character. This incorrect handling causes private data to be stored in the cache and later served to other users. The weakness is a form of insecure data storage and is identified as CWE‑524, leading to potential confidentiality breaches.
Affected Systems
Django 6.0 releases before 6.0.5 and Django 5.2 releases before 5.2.14 are affected. Earlier, unsupported Django series such as 5.0.x, 4.1.x and 3.2.x may also be impacted.
Risk and Exploitability
The CVSS score of 2.3 indicates low overall severity, and the EPSS score is not available, so the likelihood of exploitation is unclear. The vulnerability can be triggered by any HTTP request that passes through UpdateCacheMiddleware and contains a Vary header with '*', which is common in typical web traffic. The vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment
Ubuntu USN