EUVD-2026-19687

| CVE-2026-4277 CRITICAL
2026-04-07 DSF GHSA-pwjp-ccjc-ghwg
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Patch Released
Apr 07, 2026 - 21:31 nvd
Patch available
Analysis Generated
Apr 07, 2026 - 15:00 vuln.today
EUVD ID Assigned
Apr 07, 2026 - 15:00 euvd
EUVD-2026-19687
CVE Published
Apr 07, 2026 - 14:22 nvd
CRITICAL 9.8

Description

An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. Add permissions on inline model instances were not validated on submission of forged `POST` data in `GenericInlineModelAdmin`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank N05ec@LZU-DSLab for reporting this issue.

Analysis

Unauthenticated attackers can bypass add permissions in Django GenericInlineModelAdmin (versions 6.0 <6.0.4, 5.2 <5.2.13, 4.2 <4.2.30) by submitting forged POST data to inline model forms. Permission checks fail to validate creation rights on inline model instances, enabling unauthorized database record insertion with network access alone. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: inventory all Django deployments and identify which versions (6.0.x, 5.2.x, 4.2.x) are in use with GenericInlineModelAdmin. Within 7 days: apply vendor patches immediately-upgrade to Django 6.0.4 or later, 5.2.13 or later, or 4.2.30 or later depending on your version line. …

Sign in for detailed remediation steps.

Priority Score

49
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +49
POC: 0

Share

EUVD-2026-19687 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy