CVE-2025-57833: Django is subject to SQL injection through its column aliases
(updated )
An issue was discovered in Django 4.2 before 4.2.24, 5.1 before 5.1.12, and 5.2 before 5.2.6. FilteredRelation is subject to SQL injection in column aliases, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed QuerySet.annotate() or QuerySet.alias().
References
- docs.djangoproject.com/en/dev/releases/security
- github.com/advisories/GHSA-6w2r-r2m5-xq5w
- github.com/django/django
- github.com/django/django/commit/102965ea93072fe3c39a30be437c683ec1106ef5
- github.com/django/django/commit/31334e6965ad136a5e369993b01721499c5d1a92
- github.com/django/django/commit/4c044fcc866ec226f612c475950b690b0139d243
- groups.google.com/g/django-announce
- medium.com/@EyalSec/django-unauthenticated-0-click-rce-and-sql-injection-using-default-configuration-059964f3f898
- nvd.nist.gov/vuln/detail/CVE-2025-57833
- www.djangoproject.com/weblog/2025/sep/03/security-releases
Code Behaviors & Features
Detect and mitigate CVE-2025-57833 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →