{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-5766","assignerOrgId":"6a34fbeb-21d4-45e7-8e0a-62b95bc12c92","state":"PUBLISHED","assignerShortName":"DSF","dateReserved":"2026-04-07T19:29:07.042Z","datePublished":"2026-05-05T14:49:19.715Z","dateUpdated":"2026-05-06T15:25:38.926Z"},"containers":{"cna":{"providerMetadata":{"orgId":"6a34fbeb-21d4-45e7-8e0a-62b95bc12c92","shortName":"DSF","dateUpdated":"2026-05-05T14:49:19.715Z"},"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-130","description":"CWE-130: Improper Handling of Length Parameter Inconsistency","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-130","descriptions":[{"lang":"en","value":"CAPEC-130: Excessive Allocation"}]}],"title":"Potential denial-of-service vulnerability in ASGI requests via file upload limit bypass","metrics":[{"other":{"content":{"value":"low","namespace":"https://docs.djangoproject.com/en/dev/internals/security/#security-issue-severity-levels"},"type":"Django severity rating"}},{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM"}},{"cvssV4_0":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N","baseScore":6.3,"baseSeverity":"MEDIUM"}}],"descriptions":[{"lang":"en","value":"An issue was discovered in 6.0 before 6.0.5 and 5.2 before 5.2.14.\nASGI requests with a missing or understated `Content-Length` header can bypass the `FILE_UPLOAD_MAX_MEMORY_SIZE` limit, potentially loading large files into memory and causing service degradation.\r\n \r\nAs a reminder, Django expects a limit to be configured at the web server level rather than solely relying on `FILE_UPLOAD_MAX_MEMORY_SIZE`.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Kyle Agronick for reporting this issue.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>An issue was discovered in 6.0 before 6.0.5 and 5.2 before 5.2.14.</p><p>ASGI requests with a missing or understated `Content-Length` header can bypass the `FILE_UPLOAD_MAX_MEMORY_SIZE` limit, potentially loading large files into memory and causing service degradation.</p><p></p><p>As a reminder, Django expects a limit to be configured at the web server level rather than solely relying on `FILE_UPLOAD_MAX_MEMORY_SIZE`.</p><p>Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.</p><p>Django would like to thank Kyle Agronick for reporting this issue.</p>"}]}],"affected":[{"collectionURL":"https://pypi.org/project/Django/","defaultStatus":"unaffected","packageName":"django","product":"Django","repo":"https://github.com/django/django/","vendor":"djangoproject","versions":[{"status":"affected","version":"6.0","lessThan":"6.0.5","versionType":"python"},{"status":"unaffected","version":"6.0.5","versionType":"python"},{"status":"affected","version":"5.2","lessThan":"5.2.14","versionType":"python"},{"status":"unaffected","version":"5.2.14","versionType":"python"}]}],"references":[{"url":"https://docs.djangoproject.com/en/dev/releases/security/","name":"Django security archive","tags":["vendor-advisory"]},{"url":"https://groups.google.com/g/django-announce","name":"Django releases announcements","tags":["mailing-list"]},{"url":"https://www.djangoproject.com/weblog/2026/may/05/security-releases/","name":"Django security releases issued: 6.0.5 and 5.2.14","tags":["vendor-advisory"]}],"credits":[{"lang":"en","type":"reporter","value":"Kyle Agronick"},{"lang":"en","type":"remediation developer","value":"Jacob Walls"},{"lang":"en","type":"coordinator","value":"Sarah Boyce"}],"timeline":[{"lang":"en","time":"2024-05-12T10:32:17.000Z","value":"Initial report received."},{"lang":"en","time":"2026-04-07T10:32:20.000Z","value":"Vulnerability confirmed."},{"lang":"en","time":"2026-05-05T09:00:00.000Z","value":"Security release issued."}],"datePublic":"2026-05-05T09:00:00.000Z","source":{"discovery":"EXTERNAL"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-05T17:03:20.935294Z","id":"CVE-2026-5766","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-06T15:25:38.926Z"}}]}}