CVE-2025-64460

Dec. 2, 2025, 10:16 p.m.

7.5
High

Description

An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4.2 before 4.2.27. Algorithmic complexity in `django.core.serializers.xml_serializer.getInnerText()` allows a remote attacker to cause a potential denial-of-service attack triggering CPU and memory exhaustion via specially crafted XML input processed by the XML `Deserializer`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.

Product(s) Impacted

Vendor Product Versions
Djangoproject
  • Django
  • <5.2.9, <5.1.15, <5.2, <4.2.27, <5.0, <4.1, <3.2

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-407
Inefficient Algorithmic Complexity
An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached.

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
a djangoproject django <5.2.9 / / / / / / /
a djangoproject django <5.1.15 / / / / / / /
a djangoproject django <5.2 / / / / / / /
a djangoproject django <4.2.27 / / / / / / /
a djangoproject django <5.0 / / / / / / /
a djangoproject django <4.1 / / / / / / /
a djangoproject django <3.2 / / / / / / /

CVSS Score

7.5 / 10

CVSS Data - 3.1

  • Attack Vector: NETWORK
  • Attack Complexity: LOW
  • Privileges Required: NONE
  • Scope: UNCHANGED
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: HIGH
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

    View Vector String

Timeline

Published: Dec. 2, 2025, 4:15 p.m.
Last Modified: Dec. 2, 2025, 10:16 p.m.

Status : Awaiting Analysis

CVE has been recently published to the CVE List and has been received by the NVD.

More info

Source

6a34fbeb-21d4-45e7-8e0a-62b95bc12c92

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.