<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Django on Shivasurya</title><link>http://shivasurya.me/categories/django/</link><description>Recent content in Django on Shivasurya</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Fri, 07 Nov 2025 00:00:00 +0000</lastBuildDate><atom:link href="http://shivasurya.me/categories/django/feed.xml" rel="self" type="application/rss+xml"/><item><title>Some thoughts around Django SQL Injection CVE-2025-64459</title><link>http://shivasurya.me/2025/11/07/django-sql-injection-CVE-2025-64459/</link><pubDate>Fri, 07 Nov 2025 00:00:00 +0000</pubDate><guid>http://shivasurya.me/2025/11/07/django-sql-injection-CVE-2025-64459/</guid><description>&lt;h2 id="vulnerability-overview">Vulnerability Overview&lt;/h2>
&lt;p>Yesterday I came across this CVE-2025-64459 and I was bit skeptical about the severity of the issue as it was marked as critical. So I decided to do a deep dive into the issue and see if it was a real issue or not. Turns out it was a real issue only if you&amp;rsquo;re meeting the following conditions:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>You&amp;rsquo;re using Django Affected versions&lt;/p>
&lt;ul>
&lt;li>&lt;code>&amp;gt;= 5.2a1, &amp;lt; 5.2.8&lt;/code>&lt;/li>
&lt;li>&lt;code>&amp;gt;= 5.0a1, &amp;lt; 5.1.14&lt;/code>&lt;/li>
&lt;li>&lt;code>&amp;lt; 4.2.26&lt;/code>&lt;/li>
&lt;/ul>
&lt;/li>
&lt;li>
&lt;p>Source: request.GET or request.POST dict&lt;/p></description></item></channel></rss>