Medium severity6.5GHSA Advisory· Published May 5, 2026· Updated May 7, 2026
CVE-2026-35192
CVE-2026-35192
Description
An issue was discovered in 6.0 before 6.0.5 and 5.2 before 5.2.14. Response headers do not vary on cookies if a session is not modified, but SESSION_SAVE_EVERY_REQUEST is True. A remote attacker can steal a user's session after that user visits a cached public page. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Cantina for reporting this issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
DjangoPyPI | >= 6.0, < 6.0.5 | 6.0.5 |
DjangoPyPI | >= 5.2, < 5.2.14 | 5.2.14 |
Affected products
2>= 5.2, < 5.2.14+ 1 more
- (no CPE)range: >= 5.2, < 5.2.14
- cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*range: >=5.2,<5.2.14
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- docs.djangoproject.com/en/dev/releases/security/nvdVendor Advisory
- github.com/advisories/GHSA-7h2m-m8vj-598hghsaADVISORY
- groups.google.com/g/django-announcenvdThird Party AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-35192ghsaADVISORY
- www.djangoproject.com/weblog/2026/may/05/security-releases/nvdVendor Advisory
- docs.djangoproject.com/en/dev/releases/securityghsaWEB
- www.djangoproject.com/weblog/2026/may/05/security-releasesghsaWEB
News mentions
1- How AI Assistants are Moving the Security GoalpostsKrebs on Security · Mar 8, 2026