CVE-2026-25673

Published Mar 3, 2026

Last updated 12 days ago

Overview

Description
An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. `URLField.to_python()` in Django calls `urllib.parse.urlsplit()`, which performs NFKC normalization on Windows that is disproportionately slow for certain Unicode characters, allowing a remote attacker to cause denial of service via large URL inputs containing these characters. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
Source
6a34fbeb-21d4-45e7-8e0a-62b95bc12c92
NVD status
Analyzed
Products
django

Risk scores

CVSS 3.1

Type
Secondary
Base score
7.5
Impact score
3.6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Severity
HIGH

Weaknesses

6a34fbeb-21d4-45e7-8e0a-62b95bc12c92
CWE-400
nvd@nist.gov
CWE-770

Social media

Hype score
Not currently trending

Configurations