CVE-2025-59682: Django vulnerable to partial directory traversal via archives
An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the “startapp –template” and “startproject –template” commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory.
References
- docs.djangoproject.com/en/dev/releases/security
- github.com/advisories/GHSA-q95w-c7qg-hrff
- github.com/django/django
- github.com/django/django/commit/43d84aef04a9e71164c21a74885996981857e66e
- github.com/django/django/commit/924a0c092e65fa2d0953fd1855d2dc8786d94de2
- groups.google.com/g/django-announce
- nvd.nist.gov/vuln/detail/CVE-2025-59682
- www.djangoproject.com/weblog/2025/oct/01/security-releases
Code Behaviors & Features
Detect and mitigate CVE-2025-59682 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →