Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:alpm/archlinux/python-django@3.2.1-1
purl pkg:alpm/archlinux/python-django@3.2.1-1
Next non-vulnerable version 3.2.2-1
Latest non-vulnerable version 5.1.11-1
Risk 3.4
Vulnerabilities affecting this package (1)
Vulnerability Summary Fixed by
VCID-v4ad-xxy8-wfc9
Aliases:
BIT-django-2021-32052
CVE-2021-32052
GHSA-qm57-vhq3-3fwf
PYSEC-2021-8
In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.
3.2.2-1
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-kypj-ptb9-8qhz In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names. BIT-django-2021-31542
CVE-2021-31542
GHSA-rxjp-mfm9-w4wr
PYSEC-2021-7

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-01T18:27:18.453884+00:00 Arch Linux Importer Fixing VCID-kypj-ptb9-8qhz https://security.archlinux.org/AVG-1910 38.0.0
2026-04-01T18:26:45.592958+00:00 Arch Linux Importer Affected by VCID-v4ad-xxy8-wfc9 https://security.archlinux.org/AVG-1924 38.0.0