CVE-2025-64458

NameCVE-2025-64458
DescriptionAn issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. NFKC normalization in Python is slow on Windows. As a consequence, `django.http.HttpResponseRedirect`, `django.http.HttpResponsePermanentRedirect`, and the shortcut `django.shortcuts.redirect` were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-django (PTS)bullseye2:2.2.28-1~deb11u2fixed
bullseye (security)2:2.2.28-1~deb11u9fixed
bookworm, bookworm (security)3:3.2.19-1+deb12u1fixed
trixie3:4.2.23-1fixed
forky3:4.2.26-1fixed
sid3:4.2.27-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-djangosource(unstable)(not affected)

Notes

- python-django <not-affected> (Windows-specific)
https://www.djangoproject.com/weblog/2025/nov/05/security-releases/
https://github.com/django/django/commit/c880530ddd4fabd5939bab0e148bebe36699432a (main)
https://github.com/django/django/commit/770eea38d7a0e9ba9455140b5a9a9e33618226a7 (4.2.26)

Search for package or bug name: Reporting problems