Django has issued security releases 6.0.4, 5.2.13, and 4.2.30 addressing five CVEs. The vulnerabilities include ASGI header spoofing via underscore/hyphen conflation (CVE-2026-3902), privilege abuse in GenericInlineModelAdmin (CVE-2026-4277) and ModelAdmin.list_editable (CVE-2026-4292) via forged POST data, a DoS in
Table of contents
Django 4.2 has reached the end of extended supportCVE-2026-3902: ASGI header spoofing via underscore/hyphen conflationCVE-2026-4277: Privilege abuse in GenericInlineModelAdminCVE-2026-4292: Privilege abuse in ModelAdmin.list_editableCVE-2026-33033: Potential denial-of-service vulnerability in MultiPartParser via base64-encoded file uploadCVE-2026-33034: Potential denial-of-service vulnerability in ASGI requests via memory upload limit bypassAffected supported versionsResolutionThe following releases have been issuedGeneral notes regarding security reportingSort: