CVE-2025-13473
Username enumeration through timing difference in mod_wsgi authentication handler
CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.
| CWE | CWE-208 |
| Vendor | djangoproject |
| Product | django |
| Published | Feb 3, 2026 |
| Last Updated | Feb 3, 2026 |
Stay Ahead of the Next One
Get instant alerts for djangoproject django
Be the first to know when new medium vulnerabilities affecting djangoproject django are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
djangoproject / Django
6.0 < 6.0.2 5.2 < 5.2.11 4.2 < 4.2.28
References
Credits
๐ Stackered Jake Howard Jacob Walls