OESA-2026-2216

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-2216
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-2216.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2026-2216
Upstream
Published
2026-05-09T12:30:55Z
Modified
2026-05-09T12:49:59.197229Z
Summary
python-django security update
Details

A high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Security Fix(es):

An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. Race condition in file-system storage and file-based cache backends in Django allows an attacker to cause file system objects to be created with incorrect permissions via concurrent requests, where one thread's temporary umask change affects other threads in multi-threaded environments. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issue.(CVE-2026-25674)

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. MultiPartParser allows remote attackers to degrade performance by submitting multipart uploads with Content-Transfer-Encoding: base64 including excessive whitespace. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.(CVE-2026-33033)

An issue was discovered in Django's GenericInlineModelAdmin component. Add permissions on inline model instances were not validated on submission of forged POST data. This vulnerability affects Django 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank N05ec@LZU-DSLab for reporting this issue.(CVE-2026-4277)

An issue was discovered in Django 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. Admin changelist forms using ModelAdmin.list_editable incorrectly allowed new instances to be created via forged POST data. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Cantina for reporting this issue.(CVE-2026-4292)

Database specific
{
    "severity": "Critical"
}
References

Affected packages

openEuler:20.03-LTS-SP4 / python-django

Package

Name
python-django
Purl
pkg:rpm/openEuler/python-django&distro=openEuler-20.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.2.27-22.oe2003sp4

Ecosystem specific

{
    "src": [
        "python-django-2.2.27-22.oe2003sp4.src.rpm"
    ],
    "noarch": [
        "python-django-help-2.2.27-22.oe2003sp4.noarch.rpm",
        "python3-Django-2.2.27-22.oe2003sp4.noarch.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-2216.json"