{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-13473","assignerOrgId":"6a34fbeb-21d4-45e7-8e0a-62b95bc12c92","state":"PUBLISHED","assignerShortName":"DSF","dateReserved":"2025-11-20T11:44:39.641Z","datePublished":"2026-02-03T14:32:26.240Z","dateUpdated":"2026-02-03T16:19:15.167Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6a34fbeb-21d4-45e7-8e0a-62b95bc12c92","shortName":"DSF","dateUpdated":"2026-02-03T14:32:26.240Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-208","description":"CWE-208: Observable Timing Discrepancy","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-54","descriptions":[{"lang":"en","value":"CAPEC-54: Query System for Information"}]}],"title":"Username enumeration through timing difference in mod_wsgi authentication handler","metrics":[{"other":{"content":{"value":"low","namespace":"https://docs.djangoproject.com/en/dev/internals/security/#security-issue-severity-levels"},"type":"Django severity rating"}}],"descriptions":[{"lang":"en","value":"An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\nThe `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Stackered for reporting this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.</p><p>The `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack.</p><p>Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.</p><p>Django would like to thank Stackered for reporting this issue.</p>"}]}],"affected":[{"collectionURL":"https://pypi.org/project/Django/","defaultStatus":"unaffected","packageName":"django","product":"Django","repo":"https://github.com/django/django/","vendor":"djangoproject","versions":[{"status":"affected","version":"6.0","lessThan":"6.0.2","versionType":"semver"},{"status":"unaffected","version":"6.0.2","versionType":"semver"},{"status":"affected","version":"5.2","lessThan":"5.2.11","versionType":"semver"},{"status":"unaffected","version":"5.2.11","versionType":"semver"},{"status":"affected","version":"4.2","lessThan":"4.2.28","versionType":"semver"},{"status":"unaffected","version":"4.2.28","versionType":"semver"}]}],"references":[{"url":"https://docs.djangoproject.com/en/dev/releases/security/","name":"Django security archive","tags":["vendor-advisory"]},{"url":"https://groups.google.com/g/django-announce","name":"Django releases announcements","tags":["mailing-list"]},{"url":"https://www.djangoproject.com/weblog/2026/feb/03/security-releases/","name":"Django security releases issued: 6.0.2, 5.2.11, and 4.2.28","tags":["vendor-advisory"]}],"credits":[{"lang":"en","type":"reporter","value":"Stackered"},{"lang":"en","type":"remediation developer","value":"Jake Howard"},{"lang":"en","type":"coordinator","value":"Jacob Walls"}],"timeline":[{"lang":"en","time":"2025-11-12T18:00:00.000Z","value":"Initial report received."},{"lang":"en","time":"2025-11-19T18:00:00.000Z","value":"Vulnerability confirmed."},{"lang":"en","time":"2026-02-03T08:00:00.000Z","value":"Security release issued."}],"datePublic":"2026-02-03T08:00:00.000Z","source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":5.3,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"NONE","privilegesRequired":"LOW","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2026-02-03T16:19:11.902979Z","id":"CVE-2025-13473","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-03T16:19:15.167Z"}}]}}