Home

Description

django-s3file is a lightweight file upload input for Django and Amazon S3. Prior to 7.0.2, S3FileMiddleware is vulnerable to relative path traversal attacks, where an attacker can use a modified request to escape pre-signed upload locations and have the Django application load files from random locations into request.FILES. Depending on how files are handled, this may lead to confidentiality and integrity issues. This vulnerability is fixed in 7.0.2.

PUBLISHED Reserved 2026-04-25 | Published 2026-05-12 | Updated 2026-05-13 | Assigner GitHub_M




CRITICAL: 9.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N

Problem types

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-26: Path Traversal: '/dir/../filename'

Product status

< 7.0.2
affected

References

github.com/...s3file/security/advisories/GHSA-67qg-7284-2277

cve.org (CVE-2026-42196)

nvd.nist.gov (CVE-2026-42196)

Download JSON