Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25674: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in djangoproject Django

0
Low
VulnerabilityCVE-2026-25674cvecve-2026-25674cwe-362
Published: Tue Mar 03 2026 (03/03/2026, 14:28:37 UTC)
Source: CVE Database V5
Vendor/Project: djangoproject
Product: Django

Description

An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. Race condition in file-system storage and file-based cache backends in Django allows an attacker to cause file system objects to be created with incorrect permissions via concurrent requests, where one thread's temporary `umask` change affects other threads in multi-threaded environments. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issue.

AI-Powered Analysis

AILast updated: 03/03/2026, 15:03:19 UTC

Technical Analysis

CVE-2026-25674 is a concurrency-related vulnerability classified under CWE-362 (Race Condition) found in the Django web framework's file-system storage and file-based cache backends. The issue stems from the way Django temporarily changes the process umask—a setting that controls default file permissions—during file creation. In multi-threaded environments, concurrent requests can cause the temporary umask change in one thread to inadvertently affect other threads, leading to files being created with incorrect or overly permissive permissions. This race condition can result in unauthorized users gaining access to sensitive files or modifying files they should not have access to. The vulnerability affects Django versions 6.0 prior to 6.0.3, 5.2 prior to 5.2.12, and 4.2 prior to 4.2.29. Unsupported earlier versions such as 5.0.x, 4.1.x, and 3.2.x may also be vulnerable but were not formally evaluated. The flaw was responsibly disclosed by researcher Tarek Nakkouch. While no public exploits have been observed, the vulnerability poses a significant risk in environments where Django is deployed with multi-threaded request handling and file-based storage or caching. The absence of a CVSS score indicates that severity assessment must consider the potential for privilege escalation and data confidentiality breaches due to improper file permissions.

Potential Impact

The primary impact of this vulnerability is the potential for unauthorized access or modification of files due to incorrect file permissions set by concurrent requests exploiting the race condition. This can lead to confidentiality breaches if sensitive files become accessible to unauthorized users, integrity issues if files are modified maliciously, and potentially availability concerns if critical files are corrupted or deleted. Organizations running Django applications that rely on file-system storage or file-based caching in multi-threaded environments are at risk. Attackers with the ability to send concurrent requests to the application could exploit this flaw to escalate privileges or access sensitive data. The scope includes any Django deployment using affected versions and configurations, which is significant given Django's widespread use in web applications globally. The lack of known exploits in the wild suggests the vulnerability is not yet actively exploited, but the risk remains high due to the ease of triggering concurrent requests in web environments.

Mitigation Recommendations

Organizations should immediately upgrade affected Django versions to the patched releases: 6.0.3 or later, 5.2.12 or later, and 4.2.29 or later. If upgrading is not immediately feasible, mitigate risk by avoiding multi-threaded deployment configurations that handle concurrent requests affecting file creation or caching, or by switching to alternative storage and caching backends that do not rely on file-system permissions. Implement strict file permission auditing and monitoring to detect anomalous permission changes. Additionally, consider isolating Django application processes to minimize the impact of improper umask changes across threads. Review application code and deployment environments for any custom file permission handling that could exacerbate the issue. Employ runtime security tools to detect race conditions or unexpected file permission changes. Finally, maintain robust access controls and logging to quickly identify and respond to any exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
DSF
Date Reserved
2026-02-04T18:27:10.658Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a6f4b6d1a09e29cb4db07a

Added to database: 3/3/2026, 2:48:22 PM

Last enriched: 3/3/2026, 3:03:19 PM

Last updated: 3/4/2026, 6:51:01 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses