CVE-2026-25674
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to create files with incorrect permissions in Django applications, potentially exposing sensitive data or allowing unauthorized access. It occurs when multiple requests are processed at the same time, and a temporary change in file permissions by one request affects others, but it only affects specific versions of Django before certain updates.
Technical Description
An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. Race condition in file-system storage and file-based cache backends in Django allows an attacker to cause file system objects to be created with incorrect permissions via concurrent requests, where one thread's temporary `umask` change affects other threads in multi-threaded environments. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issue.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 3, 2026
about 1 month ago
Last Modified
Mar 5, 2026
about 1 month ago
Vendor
djangoproject
Product
django