CVE-2025-64458
Django vulnerability analysis and mitigation

Overview

CVE-2025-64458 is a moderate severity denial-of-service vulnerability discovered in Django web framework affecting versions 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The vulnerability was discovered by Seokchan Yoon and disclosed on November 5, 2025. The issue affects Django's HTTP redirect handling functionality on Windows systems, specifically the django.http.HttpResponseRedirect, django.http.HttpResponsePermanentRedirect, and django.shortcuts.redirect components (Django Weblog, NVD).

Technical details

The vulnerability stems from slow NFKC normalization in Python on Windows systems. When processing URLs with a very large number of Unicode characters through Django's redirect functions, the normalization process can consume excessive CPU resources. The issue has been assigned CWE-407 (Inefficient Algorithmic Complexity) and received a CVSS v3.1 base score of 7.5 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (NVD).

Impact

When exploited, this vulnerability can lead to denial-of-service conditions on Windows-based Django servers. Attackers can craft special URLs with excessive Unicode characters that, when processed by the affected redirect functions, cause significant performance degradation or service interruption (Security Online).

Mitigation and workarounds

The Django team has released patches for all affected versions. Users should upgrade to Django versions 5.2.8, 5.1.14, or 4.2.26 based on their current installation. The fixes have been applied to Django's main branch and 6.0 beta as well (Django Weblog).

Community reactions

The Django Software Foundation classified this vulnerability as 'moderate' severity under their internal security policy. The security community has noted this as a significant issue particularly for Windows-based Django deployments, though less severe than the concurrent SQL injection vulnerability (CVE-2025-64459) released in the same security update (Security Online).

Additional resources


SourceThis report was generated using AI

Related Django vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-64459CRITICAL9.1
  • DjangoDjango
  • python-django4.2
NoYesNov 05, 2025
CVE-2025-64460HIGH7.5
  • DjangoDjango
  • python-django5
NoYesDec 02, 2025
CVE-2025-64458HIGH7.5
  • DjangoDjango
  • python-django
NoYesNov 05, 2025
CVE-2025-59682MEDIUM6.5
  • DjangoDjango
  • awx
NoYesOct 01, 2025
CVE-2025-13372MEDIUM4.3
  • DjangoDjango
  • awx
NoYesDec 02, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management