VYPR
Low severityOSV Advisory· Published Feb 3, 2026· Updated Feb 3, 2026

Username enumeration through timing difference in mod_wsgi authentication handler

CVE-2025-13473

Description

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The django.contrib.auth.handlers.modwsgi.check_password() function for authentication via mod_wsgi allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
DjangoPyPI
>= 6.0a1, < 6.0.26.0.2
DjangoPyPI
>= 5.2a1, < 5.2.115.2.11
DjangoPyPI
>= 4.2a1, < 4.2.284.2.28

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.