summaryrefslogtreecommitdiff
path: root/docs
diff options
context:
space:
mode:
authorJake Howard <git@theorangeone.net>2025-08-13 14:13:42 +0200
committerSarah Boyce <42296566+sarahboyce@users.noreply.github.com>2025-09-03 13:39:26 +0200
commit31334e6965ad136a5e369993b01721499c5d1a92 (patch)
tree3a573a3b716089b6854e2c089c26b3ae1d9c28da /docs
parentd5860d55ebe3623e6c6f8d6c5a1cdb28ae4a7505 (diff)
[4.2.x] Fixed CVE-2025-57833 -- Protected FilteredRelation against SQL injection in column aliases.
Thanks Eyal Gabay (EyalSec) for the report. Backport of 51711717098d3f469f795dfa6bc3758b24f69ef7 from main.
Diffstat (limited to 'docs')
-rw-r--r--docs/releases/4.2.24.txt7
1 files changed, 7 insertions, 0 deletions
diff --git a/docs/releases/4.2.24.txt b/docs/releases/4.2.24.txt
index d6e198fb9c..e501483917 100644
--- a/docs/releases/4.2.24.txt
+++ b/docs/releases/4.2.24.txt
@@ -5,3 +5,10 @@ Django 4.2.24 release notes
*September 3, 2025*
Django 4.2.24 fixes a security issue with severity "high" in 4.2.23.
+
+CVE-2025-57833: Potential SQL injection in ``FilteredRelation`` column aliases
+==============================================================================
+
+:class:`.FilteredRelation` was subject to SQL injection in column aliases,
+using a suitably crafted dictionary, with dictionary expansion, as the
+``**kwargs`` passed to :meth:`.QuerySet.annotate` or :meth:`.QuerySet.alias`.