{"id":"CVE-2025-64459","summary":"Potential SQL injection via _connector keyword argument in QuerySet and Q objects","details":"An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8.\nThe methods `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()`, and the class `Q()`, are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the `_connector` argument.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank cyberstan for reporting this issue.","aliases":["BIT-django-2025-64459","GHSA-frmv-pr5f-9mcr"],"modified":"2026-05-15T04:14:09.305324510Z","published":"2025-11-05T15:09:58.239Z","related":["SUSE-SU-2025:4100-1","openSUSE-SU-2025:15708-1","openSUSE-SU-2025:15712-1","openSUSE-SU-2025:20153-1","openSUSE-SU-2026:10005-1"],"database_specific":{"cwe_ids":["CWE-89"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64459.json","cna_assigner":"DSF"},"references":[{"type":"WEB","url":"https://github.com/django/django/"},{"type":"WEB","url":"https://shivasurya.me/security/django/2025/11/07/django-sql-injection-CVE-2025-64459.html"},{"type":"ADVISORY","url":"https://docs.djangoproject.com/en/dev/releases/security/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64459.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-64459"},{"type":"ADVISORY","url":"https://www.djangoproject.com/weblog/2025/nov/05/security-releases/"},{"type":"PACKAGE","url":"https://pypi.org/project/Django/"},{"type":"ARTICLE","url":"https://groups.google.com/g/django-announce"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}