-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from regex patterns using '$' (which matches at string end or before a trailing newline) instead of '\Z' (strict end-of-string). This allowed newline characters in validated input. The commit diffs (e.g., 1ba1cdc) explicitly modify these validators' regexes in django/core/validators.py, and the CVE description directly names these four validators as attack vectors. High confidence is justified by the direct correlation between the vulnerability report, patch changes, and affected functions.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| django | pip | < 1.4.21 | 1.4.21 |
| Django | pip | >= 1.5, < 1.7.9 | 1.7.9 |
| Django | pip | >= 1.8a1, < 1.8.3 | 1.8.3 |