vulnerability
Arch Linux: Content spoofing (CVE-2025-48432)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Jun 5, 2025 | Jul 11, 2025 | Nov 27, 2025 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Jun 5, 2025
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
Internal HTTP response logging used request.path directly, allowing control characters (e.g. newlines or ANSI escape sequences) to be written unescaped into logs. This could enable log injection or forgery, letting attackers manipulate log appearance or structure, especially in logs processed by external systems or viewed in terminals.
Solution
arch-linux-upgrade-latest
References
- CVE-2025-48432
- https://attackerkb.com/topics/CVE-2025-48432
- URL-https://docs.djangoproject.com/en/dev/releases/security/
- URL-https://groups.google.com/g/django-announce
- URL-https://security.archlinux.org/ASA-202506-6
- URL-https://www.djangoproject.com/weblog/2025/jun/04/security-releases/
- URL-https://www.djangoproject.com/weblog/2025/jun/10/bugfix-releases/
- CWE-117
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.