Bug 2436341 (CVE-2025-14550) - CVE-2025-14550 Django: Django: Denial of Service via crafted request with duplicate headers
Summary: CVE-2025-14550 Django: Django: Denial of Service via crafted request with dup...
Keywords:
Status: NEW
Alias: CVE-2025-14550
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2436701 2436695 2436697 2436704 2436707 2436720
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-02-03 15:01 UTC by OSIDB Bzimport
Modified: 2026-03-06 10:56 UTC (History)
45 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:3958 0 None None None 2026-03-06 10:13:56 UTC
Red Hat Product Errata RHSA-2026:3959 0 None None None 2026-03-06 10:56:10 UTC

Description OSIDB Bzimport 2026-02-03 15:01:35 UTC
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Jiyong Yang for reporting this issue.

Comment 5 errata-xmlrpc 2026-03-06 10:13:53 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.6 for RHEL 9
  Red Hat Ansible Automation Platform 2.6 for RHEL 10

Via RHSA-2026:3958 https://access.redhat.com/errata/RHSA-2026:3958

Comment 6 errata-xmlrpc 2026-03-06 10:56:06 UTC
This issue has been addressed in the following products:

  Red Hat Ansible Automation Platform 2.5 for RHEL 8
  Red Hat Ansible Automation Platform 2.5 for RHEL 9

Via RHSA-2026:3959 https://access.redhat.com/errata/RHSA-2026:3959


Note You need to log in before you can comment on or make changes to this bug.