Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64458: CWE-407: Inefficient Algorithmic Complexity in djangoproject Django

0
High
VulnerabilityCVE-2025-64458cvecve-2025-64458cwe-407
Published: Wed Nov 05 2025 (11/05/2025, 15:07:17 UTC)
Source: CVE Database V5
Vendor/Project: djangoproject
Product: Django

Description

An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. NFKC normalization in Python is slow on Windows. As a consequence, `django.http.HttpResponseRedirect`, `django.http.HttpResponsePermanentRedirect`, and the shortcut `django.shortcuts.redirect` were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.

AI-Powered Analysis

AILast updated: 11/05/2025, 15:23:35 UTC

Technical Analysis

CVE-2025-64458 is a vulnerability in the Django web framework affecting versions 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8. The root cause is inefficient algorithmic complexity (CWE-407) in the Unicode NFKC normalization process on Windows platforms. Specifically, the functions django.http.HttpResponseRedirect, HttpResponsePermanentRedirect, and the shortcut django.shortcuts.redirect perform NFKC normalization on input strings. On Windows, this normalization is slow and can be exploited by an attacker supplying inputs with a very large number of Unicode characters, causing excessive CPU usage and leading to denial-of-service (DoS). The vulnerability arises because the normalization algorithm's complexity grows disproportionately with input size, allowing attackers to craft inputs that degrade server performance significantly. Earlier unsupported Django versions (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated but may also be vulnerable. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. The issue was responsibly disclosed by Seokchan Yoon. The vulnerability specifically impacts Windows deployments of Django web applications that use the affected redirect functions, which are common in web frameworks for HTTP redirection. Since the attack requires no authentication and can be triggered remotely by sending crafted HTTP requests, it poses a significant risk to availability.

Potential Impact

For European organizations, this vulnerability can lead to denial-of-service conditions on web applications built with affected Django versions running on Windows servers. This can cause service outages, degraded user experience, and potential business disruption, especially for public-facing services relying on HTTP redirects. The impact on confidentiality and integrity is minimal as the vulnerability targets availability. However, prolonged outages can indirectly affect organizational reputation and operational continuity. Organizations in sectors such as e-commerce, government services, and finance that rely on Django-based web applications are particularly at risk. The absence of known exploits reduces immediate risk, but the ease of exploitation without authentication and the widespread use of Django in Europe increase the threat potential. Attackers could leverage this vulnerability to disrupt services during critical periods or as part of larger multi-vector attacks. The impact is heightened in environments where Windows servers are used for Django hosting, which is common in mixed-OS enterprise environments.

Mitigation Recommendations

The primary mitigation is to upgrade Django to the fixed versions: 5.1.14 or later, 4.2.26 or later, or 5.2.8 or later. Organizations should prioritize patching Windows-based Django deployments that utilize the affected redirect functions. If immediate patching is not feasible, implement input validation to limit the size and complexity of Unicode inputs accepted by redirect endpoints. Deploy rate limiting and web application firewalls (WAFs) to detect and block abnormal request patterns with excessive Unicode characters. Monitoring server CPU usage and setting thresholds for alerting on unusual spikes can help detect exploitation attempts early. Consider isolating or restricting access to redirect endpoints if possible. Review application logs for suspicious requests containing large Unicode payloads. Additionally, evaluate the necessity of using the affected redirect functions and replace them with safer alternatives if applicable. Finally, educate development and operations teams about this vulnerability to ensure rapid response and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
DSF
Date Reserved
2025-11-04T14:35:57.526Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690b6b8d39a16b4c6e53b829

Added to database: 11/5/2025, 3:21:49 PM

Last enriched: 11/5/2025, 3:23:35 PM

Last updated: 11/5/2025, 5:48:20 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats