First published: Mon Jan 31 2022(Updated: )
A flaw was found in Django. The ``{% debug %}`` template tag did not properly encode the current context, posing a Cross-site scripting attack vector (XSS).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-django20 | <0:2.0.13-18.el8 | 0:2.0.13-18.el8 |
redhat/python-django | <0:3.2.13-1.el8 | 0:3.2.13-1.el8 |
redhat/python-django | <0:3.2.14-2.el8 | 0:3.2.14-2.el8 |
debian/2:2.2.25-1~deb11u1 | ||
debian/2:3.2.11-2 | ||
debian/python-django | <=1:1.11.29-1~deb10u1 | 2:3.2.12-1 2:4.0.2-1 2:2.2.28-1~deb11u1 |
debian/2:3.2.10-2 | ||
debian/1:1.10.7-2+deb9u14 | ||
Djangoproject Django | >=2.2<2.2.27 | |
Djangoproject Django | >=3.2<3.2.12 | |
Djangoproject Django | >=4.0<4.0.2 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =11.0 | |
debian/python-django | <=1:1.11.29-1~deb10u1 | 1:1.11.29-1+deb10u10 2:2.2.28-1~deb11u2 3:3.2.19-1+deb12u1 3:3.2.21-1 3:4.2.8-1 |
redhat/django | <4.0.2 | 4.0.2 |
redhat/django | <3.2.12 | 3.2.12 |
redhat/django | <2.2.27 | 2.2.27 |
pip/django | >=4.0<4.0.2 | 4.0.2 |
pip/django | >=3.2<3.2.12 | 3.2.12 |
pip/django | >=2.2<2.2.27 | 2.2.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID is CVE-2022-22818.
The severity level of CVE-2022-22818 is medium with a CVSS score of 6.1.
The affected software includes Django versions 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2.
The vulnerability in Django may lead to XSS (Cross-Site Scripting) attacks.
You can fix CVE-2022-22818 by upgrading Django to versions 2.2.27, 3.2.12, or 4.0.2 depending on your current version.