| ID |
CVE-2025-13473
|
| Sažetak |
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
The `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Stackered for reporting this issue. |
| Reference |
|
| CVSS |
| Base: | 5.3 |
| Impact: | 3.6 |
| Exploitability: | 1.6 |
|
| Pristup |
| Vektor | Složenost | Autentikacija |
| NETWORK |
HIGH |
LOW |
|
| Impact |
| Povjerljivost | Cjelovitost | Dostupnost |
| HIGH |
NONE |
NONE |
|
| CVSS vektor |
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N |
| Zadnje važnije ažuriranje |
03-02-2026 - 17:15 |
| Objavljeno |
03-02-2026 - 15:16 |