mirror of
https://github.com/django/django.git
synced 2025-10-09 14:59:24 +00:00
26 lines
1.2 KiB
Plaintext
26 lines
1.2 KiB
Plaintext
===========================
|
|
Django 4.2.25 release notes
|
|
===========================
|
|
|
|
*October 1, 2025*
|
|
|
|
Django 4.2.25 fixes one security issue with severity "high" and one security
|
|
issue with severity "low" in 4.2.24.
|
|
|
|
CVE-2025-59681: Potential SQL injection in ``QuerySet.annotate()``, ``alias()``, ``aggregate()``, and ``extra()`` on MySQL and MariaDB
|
|
======================================================================================================================================
|
|
|
|
:meth:`.QuerySet.annotate`, :meth:`~.QuerySet.alias`,
|
|
:meth:`~.QuerySet.aggregate`, and :meth:`~.QuerySet.extra` methods were subject
|
|
to SQL injection in column aliases, using a suitably crafted dictionary, with
|
|
dictionary expansion, as the ``**kwargs`` passed to these methods (follow up to
|
|
:cve:`2022-28346`).
|
|
|
|
CVE-2025-59682: Potential partial directory-traversal via ``archive.extract()``
|
|
===============================================================================
|
|
|
|
The ``django.utils.archive.extract()`` function, used by
|
|
:option:`startapp --template` and :option:`startproject --template`, allowed
|
|
partial directory-traversal via an archive with file paths sharing a common
|
|
prefix with the target directory (follow up to :cve:`2021-3281`).
|