๐Ÿ” CVE Alert

CVE-2026-5766

MEDIUM 5.3

Potential denial-of-service vulnerability in ASGI requests via file upload limit bypass

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

An issue was discovered in 6.0 before 6.0.5 and 5.2 before 5.2.14. ASGI requests with a missing or understated `Content-Length` header can bypass the `FILE_UPLOAD_MAX_MEMORY_SIZE` limit, potentially loading large files into memory and causing service degradation. As a reminder, Django expects a limit to be configured at the web server level rather than solely relying on `FILE_UPLOAD_MAX_MEMORY_SIZE`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Kyle Agronick for reporting this issue.

CWE CWE-130
Vendor djangoproject
Product django
Published May 5, 2026
Stay Ahead of the Next One

Get instant alerts for djangoproject django

Be the first to know when new medium vulnerabilities affecting djangoproject django are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

djangoproject / Django
6.0 < 6.0.5 5.2 < 5.2.14

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
docs.djangoproject.com: https://docs.djangoproject.com/en/dev/releases/security/ groups.google.com: https://groups.google.com/g/django-announce djangoproject.com: https://www.djangoproject.com/weblog/2026/may/05/security-releases/

Credits

๐Ÿ” Kyle Agronick Jacob Walls Sarah Boyce