{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-25674","assignerOrgId":"6a34fbeb-21d4-45e7-8e0a-62b95bc12c92","state":"PUBLISHED","assignerShortName":"DSF","dateReserved":"2026-02-04T18:27:10.658Z","datePublished":"2026-03-03T14:28:37.751Z","dateUpdated":"2026-03-03T15:27:10.815Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6a34fbeb-21d4-45e7-8e0a-62b95bc12c92","shortName":"DSF","dateUpdated":"2026-03-03T14:28:37.751Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-362","description":"CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-26","descriptions":[{"lang":"en","value":"CAPEC-26: Leveraging Race Conditions"}]}],"title":"Potential incorrect permissions on newly created file system objects","metrics":[{"other":{"content":{"value":"low","namespace":"https://docs.djangoproject.com/en/dev/internals/security/#security-issue-severity-levels"},"type":"Django severity rating"}}],"descriptions":[{"lang":"en","value":"An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29.\nRace condition in file-system storage and file-based cache backends in Django allows an attacker to cause file system objects to be created with incorrect permissions via concurrent requests, where one thread's temporary `umask` change affects other threads in multi-threaded environments.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Tarek Nakkouch for reporting this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29.</p><p>Race condition in file-system storage and file-based cache backends in Django allows an attacker to cause file system objects to be created with incorrect permissions via concurrent requests, where one thread&#x27;s temporary `umask` change affects other threads in multi-threaded environments.</p><p>Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.</p><p>Django would like to thank Tarek Nakkouch for reporting this issue.</p>"}]}],"affected":[{"collectionURL":"https://pypi.org/project/Django/","defaultStatus":"unaffected","packageName":"django","product":"Django","repo":"https://github.com/django/django/","vendor":"djangoproject","versions":[{"status":"affected","version":"6.0","lessThan":"6.0.3","versionType":"semver"},{"status":"unaffected","version":"6.0.3","versionType":"semver"},{"status":"affected","version":"5.2","lessThan":"5.2.12","versionType":"semver"},{"status":"unaffected","version":"5.2.12","versionType":"semver"},{"status":"affected","version":"4.2","lessThan":"4.2.29","versionType":"semver"},{"status":"unaffected","version":"4.2.29","versionType":"semver"}]}],"references":[{"url":"https://docs.djangoproject.com/en/dev/releases/security/","name":"Django security archive","tags":["vendor-advisory"]},{"url":"https://groups.google.com/g/django-announce","name":"Django releases announcements","tags":["mailing-list"]},{"url":"https://www.djangoproject.com/weblog/2026/mar/03/security-releases/","name":"Django security releases issued: 6.0.3, 5.2.12, and 4.2.29","tags":["vendor-advisory"]}],"credits":[{"lang":"en","type":"reporter","value":"Tarek Nakkouch"},{"lang":"en","type":"remediation developer","value":"Natalia Bidart"},{"lang":"en","type":"coordinator","value":"Natalia Bidart"}],"timeline":[{"lang":"en","time":"2026-01-20T12:00:00.000Z","value":"Initial report received."},{"lang":"en","time":"2026-02-20T12:00:00.000Z","value":"Vulnerability confirmed."},{"lang":"en","time":"2026-03-03T08:00:00.000Z","value":"Security release issued."}],"datePublic":"2026-03-03T08:00:00.000Z","source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":3.7,"attackVector":"NETWORK","baseSeverity":"LOW","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N","integrityImpact":"NONE","userInteraction":"NONE","attackComplexity":"HIGH","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2026-03-03T15:27:07.815602Z","id":"CVE-2026-25674","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-03T15:27:10.815Z"}}]}}