Medium severity6.5NVD Advisory· Published Apr 7, 2026· Updated Apr 13, 2026
CVE-2026-33033
CVE-2026-33033
Description
An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. MultiPartParser allows remote attackers to degrade performance by submitting multipart uploads with Content-Transfer-Encoding: base64 including excessive whitespace. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
DjangoPyPI | >= 6.0, < 6.0.4 | 6.0.4 |
DjangoPyPI | >= 5.2, < 5.2.13 | 5.2.13 |
DjangoPyPI | >= 4.2, < 4.2.30 | 4.2.30 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- docs.djangoproject.com/en/dev/releases/security/nvdPatchVendor Advisory
- www.djangoproject.com/weblog/2026/apr/07/security-releases/nvdPatchVendor Advisory
- github.com/advisories/GHSA-5mf9-h53q-7mhqghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33033ghsaADVISORY
- docs.djangoproject.com/en/dev/releases/securityghsaWEB
- groups.google.com/g/django-announcenvdRelease NotesWEB
- www.djangoproject.com/weblog/2026/apr/07/security-releasesghsaWEB
News mentions
0No linked articles in our index yet.