Description
An issue was discovered in 6.0 before 6.0.5 and 5.2 before 5.2.14. Response headers do not vary on cookies if a session is not modified, but `SESSION_SAVE_EVERY_REQUEST` is `True`. A remote attacker can steal a user's session after that user visits a cached public page. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Cantina for reporting this issue.
Problem types
CWE-539: Use of Persistent Cookies Containing Sensitive Information
Product status
6.0 (python) before 6.0.5
6.0.5 (python)
5.2 (python) before 5.2.14
5.2.14 (python)
Timeline
| 2026-03-11: | Initial report received. |
| 2026-04-01: | Vulnerability confirmed. |
| 2026-05-05: | Security release issued. |
Credits
Cantina
Jake Howard
Sarah Boyce
References
docs.djangoproject.com/en/dev/releases/security/ (Django security archive)
groups.google.com/g/django-announce (Django releases announcements)
www.djangoproject.com/weblog/2026/may/05/security-releases/ (Django security releases issued: 6.0.5 and 5.2.14)