CVE-2025-13473: CWE-208: Observable Timing Discrepancy in djangoproject Django
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.
AI Analysis
Technical Summary
CVE-2025-13473 is a vulnerability identified in the Django web framework's authentication system specifically when deployed with mod_wsgi. The issue arises from the check_password() function in django.contrib.auth.handlers.modwsgi, which processes password verification. Due to observable timing discrepancies in how the function responds to authentication attempts, remote attackers can perform timing attacks to enumerate valid usernames on the system. This vulnerability affects Django versions 6.0 prior to 6.0.2, 5.2 prior to 5.2.11, and 4.2 prior to 4.2.28. Earlier unsupported versions such as 5.0.x, 4.1.x, and 3.2.x may also be vulnerable but were not formally evaluated. The vulnerability is classified under CWE-208 (Observable Timing Discrepancy), which involves attackers inferring sensitive information by measuring response time variations. Exploiting this flaw requires network access but no user interaction, and only low privileges are needed to attempt authentication. The vulnerability allows attackers to confirm valid usernames, which can facilitate further attacks like brute force password guessing or social engineering. Although no known exploits are currently reported in the wild, the medium CVSS score of 5.3 reflects moderate risk due to the confidentiality impact without integrity or availability compromise. The issue was responsibly disclosed by a researcher named Stackered and has been addressed in the specified patched Django releases.
Potential Impact
The primary impact of CVE-2025-13473 is the disclosure of valid usernames through timing side-channel attacks during authentication attempts. This user enumeration can significantly aid attackers by reducing the attack surface for password guessing, credential stuffing, or phishing campaigns. While the vulnerability does not directly compromise password integrity or system availability, the confidentiality breach of user identity information can lead to targeted attacks against organizations. For web applications relying on Django with mod_wsgi, especially those exposing authentication endpoints publicly, this vulnerability increases the risk of account compromise and subsequent data breaches. Organizations with large user bases or sensitive data are particularly vulnerable to the cascading effects of user enumeration. Additionally, attackers can use this information to evade detection by focusing on valid accounts, complicating incident response. The lack of required user interaction and the ability to exploit remotely over the network further elevate the threat level. Although no active exploits are reported, the widespread use of Django in web development globally means the potential impact is broad and significant.
Mitigation Recommendations
To mitigate CVE-2025-13473, organizations should promptly upgrade Django to versions 6.0.2 or later, 5.2.11 or later, and 4.2.28 or later, where the vulnerability has been patched. If immediate upgrading is not feasible, implementing additional rate limiting on authentication endpoints can reduce the feasibility of timing attacks by limiting the number of authentication attempts from a single source. Employing consistent response times for authentication failures can help obscure timing discrepancies, though this may require custom middleware or patches. Monitoring authentication logs for unusual patterns of failed login attempts or username enumeration attempts is critical for early detection. Additionally, consider deploying Web Application Firewalls (WAFs) configured to detect and block suspicious timing attack patterns. Educating developers to avoid leaking timing information in authentication flows and reviewing custom authentication handlers for similar issues is recommended. Finally, ensure that multi-factor authentication (MFA) is enabled to reduce the impact of compromised credentials obtained through enumeration and brute force.
Affected Countries
United States, Germany, United Kingdom, France, Japan, India, Canada, Australia, Netherlands, Brazil
CVE-2025-13473: CWE-208: Observable Timing Discrepancy in djangoproject Django
Description
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13473 is a vulnerability identified in the Django web framework's authentication system specifically when deployed with mod_wsgi. The issue arises from the check_password() function in django.contrib.auth.handlers.modwsgi, which processes password verification. Due to observable timing discrepancies in how the function responds to authentication attempts, remote attackers can perform timing attacks to enumerate valid usernames on the system. This vulnerability affects Django versions 6.0 prior to 6.0.2, 5.2 prior to 5.2.11, and 4.2 prior to 4.2.28. Earlier unsupported versions such as 5.0.x, 4.1.x, and 3.2.x may also be vulnerable but were not formally evaluated. The vulnerability is classified under CWE-208 (Observable Timing Discrepancy), which involves attackers inferring sensitive information by measuring response time variations. Exploiting this flaw requires network access but no user interaction, and only low privileges are needed to attempt authentication. The vulnerability allows attackers to confirm valid usernames, which can facilitate further attacks like brute force password guessing or social engineering. Although no known exploits are currently reported in the wild, the medium CVSS score of 5.3 reflects moderate risk due to the confidentiality impact without integrity or availability compromise. The issue was responsibly disclosed by a researcher named Stackered and has been addressed in the specified patched Django releases.
Potential Impact
The primary impact of CVE-2025-13473 is the disclosure of valid usernames through timing side-channel attacks during authentication attempts. This user enumeration can significantly aid attackers by reducing the attack surface for password guessing, credential stuffing, or phishing campaigns. While the vulnerability does not directly compromise password integrity or system availability, the confidentiality breach of user identity information can lead to targeted attacks against organizations. For web applications relying on Django with mod_wsgi, especially those exposing authentication endpoints publicly, this vulnerability increases the risk of account compromise and subsequent data breaches. Organizations with large user bases or sensitive data are particularly vulnerable to the cascading effects of user enumeration. Additionally, attackers can use this information to evade detection by focusing on valid accounts, complicating incident response. The lack of required user interaction and the ability to exploit remotely over the network further elevate the threat level. Although no active exploits are reported, the widespread use of Django in web development globally means the potential impact is broad and significant.
Mitigation Recommendations
To mitigate CVE-2025-13473, organizations should promptly upgrade Django to versions 6.0.2 or later, 5.2.11 or later, and 4.2.28 or later, where the vulnerability has been patched. If immediate upgrading is not feasible, implementing additional rate limiting on authentication endpoints can reduce the feasibility of timing attacks by limiting the number of authentication attempts from a single source. Employing consistent response times for authentication failures can help obscure timing discrepancies, though this may require custom middleware or patches. Monitoring authentication logs for unusual patterns of failed login attempts or username enumeration attempts is critical for early detection. Additionally, consider deploying Web Application Firewalls (WAFs) configured to detect and block suspicious timing attack patterns. Educating developers to avoid leaking timing information in authentication flows and reviewing custom authentication handlers for similar issues is recommended. Finally, ensure that multi-factor authentication (MFA) is enabled to reduce the impact of compromised credentials obtained through enumeration and brute force.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- DSF
- Date Reserved
- 2025-11-20T11:44:39.641Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69820d79f9fa50a62fcd6032
Added to database: 2/3/2026, 3:00:09 PM
Last enriched: 2/27/2026, 9:53:56 AM
Last updated: 3/26/2026, 9:19:48 AM
Views: 70
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.