CVE-2026-42196 PUBLISHED

django-s3file: Relative path traversal

Assigner: GitHub_M
Reserved: 25.04.2026 Published: 12.05.2026 Updated: 12.05.2026

django-s3file is a lightweight file upload input for Django and Amazon S3. Prior to 7.0.2, S3FileMiddleware is vulnerable to relative path traversal attacks, where an attacker can use a modified request to escape pre-signed upload locations and have the Django application load files from random locations into request.FILES. Depending on how files are handled, this may lead to confidentiality and integrity issues. This vulnerability is fixed in 7.0.2.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N
CVSS Score: 9.9

Product Status

Vendor codingjoe
Product django-s3file
Versions
  • Version < 7.0.2 is affected

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE
  • CWE-26: Path Traversal: '/dir/../filename' CWE