CVE-2026-25674: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in djangoproject Django
An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. Race condition in file-system storage and file-based cache backends in Django allows an attacker to cause file system objects to be created with incorrect permissions via concurrent requests, where one thread's temporary `umask` change affects other threads in multi-threaded environments. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issue.
AI Analysis
Technical Summary
CVE-2026-25674 is a concurrency-related vulnerability classified under CWE-362 (Race Condition) found in the Django web framework's file-system storage and file-based cache backends. The issue stems from the way Django temporarily changes the process umask—a setting that controls default file permissions—during file creation. In multi-threaded environments, concurrent requests can cause the temporary umask change in one thread to inadvertently affect other threads, leading to files being created with incorrect or overly permissive permissions. This race condition can result in unauthorized users gaining access to sensitive files or modifying files they should not have access to. The vulnerability affects Django versions 6.0 prior to 6.0.3, 5.2 prior to 5.2.12, and 4.2 prior to 4.2.29. Unsupported earlier versions such as 5.0.x, 4.1.x, and 3.2.x may also be vulnerable but were not formally evaluated. The flaw was responsibly disclosed by researcher Tarek Nakkouch. While no public exploits have been observed, the vulnerability poses a significant risk in environments where Django is deployed with multi-threaded request handling and file-based storage or caching. The absence of a CVSS score indicates that severity assessment must consider the potential for privilege escalation and data confidentiality breaches due to improper file permissions.
Potential Impact
The primary impact of this vulnerability is the potential for unauthorized access or modification of files due to incorrect file permissions set by concurrent requests exploiting the race condition. This can lead to confidentiality breaches if sensitive files become accessible to unauthorized users, integrity issues if files are modified maliciously, and potentially availability concerns if critical files are corrupted or deleted. Organizations running Django applications that rely on file-system storage or file-based caching in multi-threaded environments are at risk. Attackers with the ability to send concurrent requests to the application could exploit this flaw to escalate privileges or access sensitive data. The scope includes any Django deployment using affected versions and configurations, which is significant given Django's widespread use in web applications globally. The lack of known exploits in the wild suggests the vulnerability is not yet actively exploited, but the risk remains high due to the ease of triggering concurrent requests in web environments.
Mitigation Recommendations
Organizations should immediately upgrade affected Django versions to the patched releases: 6.0.3 or later, 5.2.12 or later, and 4.2.29 or later. If upgrading is not immediately feasible, mitigate risk by avoiding multi-threaded deployment configurations that handle concurrent requests affecting file creation or caching, or by switching to alternative storage and caching backends that do not rely on file-system permissions. Implement strict file permission auditing and monitoring to detect anomalous permission changes. Additionally, consider isolating Django application processes to minimize the impact of improper umask changes across threads. Review application code and deployment environments for any custom file permission handling that could exacerbate the issue. Employ runtime security tools to detect race conditions or unexpected file permission changes. Finally, maintain robust access controls and logging to quickly identify and respond to any exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, France, Japan, Australia, Canada, India, Brazil, Netherlands, South Korea, Sweden, Singapore
CVE-2026-25674: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in djangoproject Django
Description
An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29. Race condition in file-system storage and file-based cache backends in Django allows an attacker to cause file system objects to be created with incorrect permissions via concurrent requests, where one thread's temporary `umask` change affects other threads in multi-threaded environments. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issue.
AI-Powered Analysis
Technical Analysis
CVE-2026-25674 is a concurrency-related vulnerability classified under CWE-362 (Race Condition) found in the Django web framework's file-system storage and file-based cache backends. The issue stems from the way Django temporarily changes the process umask—a setting that controls default file permissions—during file creation. In multi-threaded environments, concurrent requests can cause the temporary umask change in one thread to inadvertently affect other threads, leading to files being created with incorrect or overly permissive permissions. This race condition can result in unauthorized users gaining access to sensitive files or modifying files they should not have access to. The vulnerability affects Django versions 6.0 prior to 6.0.3, 5.2 prior to 5.2.12, and 4.2 prior to 4.2.29. Unsupported earlier versions such as 5.0.x, 4.1.x, and 3.2.x may also be vulnerable but were not formally evaluated. The flaw was responsibly disclosed by researcher Tarek Nakkouch. While no public exploits have been observed, the vulnerability poses a significant risk in environments where Django is deployed with multi-threaded request handling and file-based storage or caching. The absence of a CVSS score indicates that severity assessment must consider the potential for privilege escalation and data confidentiality breaches due to improper file permissions.
Potential Impact
The primary impact of this vulnerability is the potential for unauthorized access or modification of files due to incorrect file permissions set by concurrent requests exploiting the race condition. This can lead to confidentiality breaches if sensitive files become accessible to unauthorized users, integrity issues if files are modified maliciously, and potentially availability concerns if critical files are corrupted or deleted. Organizations running Django applications that rely on file-system storage or file-based caching in multi-threaded environments are at risk. Attackers with the ability to send concurrent requests to the application could exploit this flaw to escalate privileges or access sensitive data. The scope includes any Django deployment using affected versions and configurations, which is significant given Django's widespread use in web applications globally. The lack of known exploits in the wild suggests the vulnerability is not yet actively exploited, but the risk remains high due to the ease of triggering concurrent requests in web environments.
Mitigation Recommendations
Organizations should immediately upgrade affected Django versions to the patched releases: 6.0.3 or later, 5.2.12 or later, and 4.2.29 or later. If upgrading is not immediately feasible, mitigate risk by avoiding multi-threaded deployment configurations that handle concurrent requests affecting file creation or caching, or by switching to alternative storage and caching backends that do not rely on file-system permissions. Implement strict file permission auditing and monitoring to detect anomalous permission changes. Additionally, consider isolating Django application processes to minimize the impact of improper umask changes across threads. Review application code and deployment environments for any custom file permission handling that could exacerbate the issue. Employ runtime security tools to detect race conditions or unexpected file permission changes. Finally, maintain robust access controls and logging to quickly identify and respond to any exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- DSF
- Date Reserved
- 2026-02-04T18:27:10.658Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69a6f4b6d1a09e29cb4db07a
Added to database: 3/3/2026, 2:48:22 PM
Last enriched: 3/3/2026, 3:03:19 PM
Last updated: 3/4/2026, 6:51:01 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2732: CWE-862 Missing Authorization in shortpixel Enable Media Replace
MediumCVE-2026-2363: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in cbutlerjr WP-Members Membership Plugin
MediumCVE-2026-2025: CWE-200 Information Exposure in Mail Mint
HighCVE-2026-27012: CWE-306: Missing Authentication for Critical Function in devcode-it openstamanager
CriticalCVE-2026-28289: CWE-434: Unrestricted Upload of File with Dangerous Type in freescout-help-desk freescout
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.