Skip to content

Conversation

@cx-shubham-yadav
Copy link

@cx-shubham-yadav cx-shubham-yadav commented Oct 14, 2025

By submitting this pull request, you agree to the terms within the Checkmarx Code of Conduct. Please review the contributing guidelines for guidance on creating high-quality pull requests.

Description

Please provide a summary of the changes and the related issue. Include relevant motivation and context.

Type of Change

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • Documentation update

Related Issues

Link any related issues or tickets.

Checklist

  • I have performed a self-review of my code
  • I have added tests that prove my fix is effective or that my feature works
  • I have added necessary documentation (if appropriate)
  • Any dependent changes have been merged and published in downstream modules
  • I have updated the CLI help for new/changed functionality in this PR (if applicable)
  • All active GitHub checks for tests, formatting, and security are passing
  • The correct base branch is being used

Screenshots (if applicable)

Add screenshots to help explain your changes.

Additional Notes

Add any other relevant information.

@github-actions
Copy link

github-actions bot commented Oct 14, 2025

Logo
Checkmarx One – Scan Summary & Details5262a780-0a37-4890-b8df-c3d965815491

New Issues (15)

Checkmarx found the following issues in this Pull Request

Severity Issue Source File / Package Checkmarx Insight
CRITICAL CVE-2024-53908 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django versions 3.1a1 through 4.2.16, 5.0a1 through 5.0.9, and 5.1a1 through 5.1.3. Direct usage of the `django.db.model...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: 4nTeGQI2EChBghuQyal5dIK7fzlJ66GHJ%2BsWqpedYJs%3D
Vulnerable Package
HIGH CVE-2023-30861 Python-Flask-1.1.2
detailsRecommended version: 2.2.5
Description: Flask is a lightweight WSGI web application framework. When all of the following conditions are met, a response containing data intended for one cl...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: CueR6TgDgQNvpSvevfjjF7tJFN8tbo3n5acZN05H0xU%3D
Vulnerable Package
HIGH CVE-2024-38875 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django versions prior to 4.2.14, 5.0.x prior to 5.0.7, 5.1a1, and 5.1b1. "urlize" and "urlizetrunc" were subject to a po...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: YctsLUdMOROWSC7CTMwbNSqLKoRjL0UnXZK58eJns%2Bs%3D
Vulnerable Package
HIGH CVE-2024-39330 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django versions prior to 4.2.14, 5.0.x prior to 5.0.7, 5.1a1, and 5.1b1. Derived classes of the "django.core.files.stora...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: %2BxBl6frvv3rZHXxwe6%2Bzq4HC%2BDxMZYKoXk4x3Q53Ad0%3D
Vulnerable Package
HIGH CVE-2024-39614 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django versions prior to 4.2.14, 5.0.x prior to 5.0.7, 5.1a1, and 5.1b1. The "get_supported_language_variant()" was subj...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: XlF5OpSrKtZPOqssR24eUM0nDIKZQ7wH4jjqYBox%2Fqk%3D
Vulnerable Package
HIGH CVE-2024-41989 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django versions through 4.2.14, 5.0a1 through 5.0.7, and 5.1a1 through 5.1rc1. The "floatformat" template filter is subj...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: eHIbQ699YCZAaXfu8hx3onwkVRETxIyNEj%2FaJmlW%2FTs%3D
Vulnerable Package
HIGH CVE-2024-41990 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django versions through 4.2.14, 5.0a1 through 5.0.7, and 5.1a1 through 5.1rc1. The "urlize()" and "urlizetrunc()" templa...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: u1rvJOht0GTOpv4OyXeoR%2FqCz8W16pFpY1dG2SQwqq0%3D
Vulnerable Package
HIGH CVE-2024-41991 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django versions through 4.2.14, 5.0a1 through 5.0.7, and 5.1a1 through 5.1rc1. The "urlize" and "urlizetrunc" template f...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: BieDR2ypOolHPWAwHNkVBDx%2BE3i8iWdYW%2FWvEGn3Hi8%3D
Vulnerable Package
HIGH CVE-2024-42005 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django versions through 4.2.14, 5.0a1 through 5.0.7, and 5.1a1 through 5.1rc1. "QuerySet.values()" and "values_list()" m...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: DE3KhZiYkfiJzwJVIMvawjc3omYWVENC3hWUIuqNXww%3D
Vulnerable Package
HIGH CVE-2024-53907 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django versions 1.6.3 through 4.2.16, 5.0a1 through 5.0.9, and 5.1a1 through 5.1.3. The `strip_tags()` method and `strip...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: vFOewQyZP3gzz3YbgnKQeqd8c8Hk6wdZY4yc%2FKYHsKA%3D
Vulnerable Package
HIGH CVE-2025-57833 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django versions 2.0a1 through 4.2.23, 5.0a1 through 5.1.11, and 5.2a1 through 5.2.5. "FilteredRelation" is subject to SQ...
Attack Vector: NETWORK
Attack Complexity: HIGH

ID: WGWoEXv4flMT7sWJXh9JS9MulJkibhupZ4Bawsg2gbk%3D
Vulnerable Package
MEDIUM CVE-2024-39329 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django versions prior to 4.2.14, 5.0.x prior to 5.0.7, 5.1a1, and 5.1b1. The "django.contrib.auth.backends.ModelBackend....
Attack Vector: NETWORK
Attack Complexity: LOW

ID: eJ8baF9hDSWFACjB7s7tZ%2B6NYvwIcdFnLM3W1wEBKSg%3D
Vulnerable Package
MEDIUM CVE-2024-45231 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django prior to 4.2.16, 5.0.x prior to 5.0.9, and 5.1.x prior to 5.1.1. The 'django.contrib.auth.forms.PasswordResetForm...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: cDYFiSTSH2%2BGT1Q0Ci6F5OZDQcE9SIF0PIj3J7FQ%2BQY%3D
Vulnerable Package
MEDIUM CVE-2025-32873 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django versions through 4.2.20, 5.0a1 through 5.1.8, and 5.2a1 through 5.2. The "django.utils.html.strip_tags()" functio...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: y2vVGhFoNbTlzsQHALe1QtnB9hC4EceDJMBJA3kdbW0%3D
Vulnerable Package
MEDIUM CVE-2025-48432 Python-Django-3.2.25
detailsRecommended version: 4.2.25
Description: An issue was discovered in Django. Internal HTTP response logging does not escape "request.path", which allows remote attackers to potentially mani...
Attack Vector: NETWORK
Attack Complexity: LOW

ID: QYjeXeF8izmGfSRY%2FXFGzwP%2FlJYpWSrQKl1XMDX8Wa0%3D
Vulnerable Package

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants