CVE-2025-57833
Django vulnerability analysis and mitigation

Overview

A high-severity SQL injection vulnerability (CVE-2025-57833) was discovered in Django versions 4.2 before 4.2.24, 5.1 before 5.1.12, and 5.2 before 5.2.6. The vulnerability exists in FilteredRelation where SQL injection is possible through column aliases when using a specially crafted dictionary with dictionary expansion in the **kwargs passed to QuerySet.annotate() or QuerySet.alias() (Django Security, NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 7.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N. The issue specifically affects the FilteredRelation functionality when used with selectrelated, where an attacker with control over the FilteredRelation and selectrelated parameters can manipulate SQL queries (Security Online, EyalSec Blog).

Impact

The vulnerability can lead to unauthorized data access and potential remote code execution (RCE) specifically on PostgreSQL databases through SQL injection. On other database systems, the impact is limited to SQL injection capabilities. This could allow attackers to access, modify, or exfiltrate sensitive data from the application's database (EyalSec Blog).

Mitigation and workarounds

The Django team has released patched versions to address this vulnerability: Django 5.2.6, Django 5.1.12, and Django 4.2.24. Users are strongly encouraged to upgrade to these versions immediately. The fixes have been applied to Django's main, 5.2, 5.1, and 4.2 branches (Django Security).

Community reactions

The Django Software Foundation classified this vulnerability as 'high' severity according to their security policy. The security community has shown particular concern due to the unauthenticated nature of the exploit and its potential for RCE on PostgreSQL databases (Security Online).

Additional resources


SourceThis report was generated using AI

Related Django vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-59681CRITICAL9.8
  • DjangoDjango
  • awx
NoYesOct 01, 2025
CVE-2025-57833HIGH8.1
  • DjangoDjango
  • awx
NoYesSep 03, 2025
CVE-2025-59682MEDIUM6.5
  • DjangoDjango
  • python-django
NoYesOct 01, 2025
CVE-2025-48432MEDIUM5.3
  • DjangoDjango
  • awx
NoYesJun 05, 2025
CVE-2025-32873MEDIUM5.3
  • DjangoDjango
  • dev-python/django
NoYesMay 08, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management