Description
An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4.2 before 4.2.27. Algorithmic complexity in `django.core.serializers.xml_serializer.getInnerText()` allows a remote attacker to cause a potential denial-of-service attack triggering CPU and memory exhaustion via specially crafted XML input processed by the XML `Deserializer`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
Problem types
CWE-407: Inefficient Algorithmic Complexity
Product status
5.2 (semver) before 5.2.9
5.2.9 (semver)
5.1 (semver) before 5.1.15
5.1.15 (semver)
4.2 (semver) before 4.2.27
4.2.27 (semver)
Timeline
| 2025-10-03: | Initial report received. |
| 2025-10-03: | Vulnerability confirmed. |
| 2025-12-02: | Security release issued. |
Credits
Seokchan Yoon
Shai Berger
Natalia Bidart
References
docs.djangoproject.com/en/dev/releases/security/ (Django security archive)
groups.google.com/g/django-announce (Django releases announcements)
www.djangoproject.com/weblog/2025/dec/02/security-releases/ (Django security releases issued: 5.2.9, 5.1.15, and 4.2.27)