CVE-2025-13473 PUBLISHED

Username enumeration through timing difference in mod_wsgi authentication handler

Assigner: DSF
Reserved: 20.11.2025 Published: 03.02.2026 Updated: 03.02.2026

An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. The django.contrib.auth.handlers.modwsgi.check_password() function for authentication via mod_wsgi allows remote attackers to enumerate users via a timing attack. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.

Product Status

Vendor djangoproject
Product Django
Versions Default: unaffected
  • affected from 6.0 to 6.0.2 (excl.)
  • Version 6.0.2 is unaffected
  • affected from 5.2 to 5.2.11 (excl.)
  • Version 5.2.11 is unaffected
  • affected from 4.2 to 4.2.28 (excl.)
  • Version 4.2.28 is unaffected

Credits

  • Stackered reporter
  • Jake Howard remediation developer
  • Jacob Walls coordinator

References

Problem Types

  • CWE-208: Observable Timing Discrepancy CWE

Impacts

  • CAPEC-54: Query System for Information