{"id":"BIT-django-2025-64459","summary":"Potential SQL injection via _connector keyword argument in QuerySet and Q objects","details":"An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8.\nThe methods `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()`, and the class `Q()`, are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the `_connector` argument.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank cyberstan for reporting this issue.","aliases":["CVE-2025-64459","GHSA-frmv-pr5f-9mcr"],"modified":"2025-11-11T14:58:59.345217Z","published":"2025-11-11T11:36:39.904Z","database_specific":{"severity":"Critical","cpes":["cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://docs.djangoproject.com/en/dev/releases/security/"},{"type":"WEB","url":"https://groups.google.com/g/django-announce"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-64459"},{"type":"WEB","url":"https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-64459.html"},{"type":"WEB","url":"https://www.djangoproject.com/weblog/2025/nov/05/security-releases/"}],"affected":[{"package":{"name":"django","ecosystem":"Bitnami","purl":"pkg:bitnami/django"},"ranges":[{"type":"SEMVER","events":[{"introduced":"4.2.0"},{"fixed":"4.2.26"},{"introduced":"5.1.0"},{"fixed":"5.1.14"},{"introduced":"5.2.0"},{"fixed":"5.2.8"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/django/BIT-django-2025-64459.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}],"schema_version":"1.7.3"}