Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple Django Vulnerabilities Enables SQL Injection and Denial-of-Service Attacks

Posted on December 3, 2025December 3, 2025 By CWS

The event staff has formally launched important safety updates to deal with two important vulnerabilities discovered within the well-liked net framework.

These points vary from excessive to reasonable severity. They may permit attackers to compromise database integrity or crash servers by way of useful resource exhaustion.

Essentially the most crucial flaw, tracked as CVE-2025-13372, is a high-severity SQL injection vulnerability affecting initiatives that use PostgreSQL. The problem lies inside the FilteredRelation class, particularly the way it handles column aliases.

Attackers can exploit this by crafting a particular dictionary (utilizing dictionary growth) handed to QuerySet.annotate() or QuerySet.alias(). If profitable, this manipulation permits malicious SQL code to be injected into the database question.

The second vulnerability, CVE-2025-64460, is a moderate-severity difficulty involving the XML serializer.

Django found that the strategy django.core.serializers.xml_serializer. getInnerText() suffers from algorithmic complexity points.

CVE IDVulnerability TypeSeverityCVE-2025-13372SQL InjectionHighCVE-2025-64460Denial of Service (DoS)Average

When an software processes specifically crafted XML enter, the serializer repeatedly concatenates strings because it collects textual content nodes.

Django has launched safety updates 5.2.9, 5.1.15, and 4.2.27, and builders are strongly suggested to improve immediately to keep away from potential assaults.

This recursive course of can result in “superlinear” computation time, inflicting the server’s CPU and reminiscence utilization to spike.

A distant attacker may use this to set off a denial-of-service (DoS) assault, successfully crashing the service or making it unresponsive.

These vulnerabilities have an effect on all supported variations of Django, together with the primary department and the upcoming Django 6.0 (presently in launch candidate standing).

Builders utilizing the primary department or the Django 6.0 launch candidate ought to pull the most recent commits from the official repository to make sure their initiatives are safe.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attacks, DenialofService, Django, Enables, Injection, Multiple, SQL, Vulnerabilities

Post navigation

Previous Post: Chrome 143 Released With Fix for 13 Vulnerabilities that Enables Arbitrary Code Execution
Next Post: Malicious Rust Crate Delivers OS-Specific Malware to Web3 Developer Systems

Related Posts

Threat Actors Leverages DeepSeek-R1 Popularity to Attack Users Running Windows Devices Cyber Security News
How to Solve Alert Fatigue in Your SOC without Extra Staff or Effort Cyber Security News
Microsoft September 2025 Patch Tuesday Cyber Security News
Hackers Actively Exploiting Cisco and Citrix 0-Days in the Wild to Deploy Webshell Cyber Security News
Ransomware Gangs Actively Expanding to Attack VMware and Linux Systems Cyber Security News
Darknet Market Escrow Systems is Vulnerable to Administrator Exit Scams Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability
  • GoldFactory Hits Southeast Asia with Modified Banking Apps Driving 11,000+ Infections
  • Hackers Leverage Velociraptor DFIR Tool for Stealthy C2 & Ransomware Delivery
  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark