{"id":"BIT-django-2026-1287","summary":"Potential SQL injection in column aliases via control characters","details":"An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n`FilteredRelation` is subject to SQL injection in column aliases via control characters, using a suitably crafted dictionary, with dictionary expansion, as the `**kwargs` passed to `QuerySet` methods `annotate()`, `aggregate()`, `extra()`, `values()`, `values_list()`, and `alias()`.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Solomon Kebede for reporting this issue.","aliases":["CVE-2026-1287","GHSA-gvg8-93h5-g6qq"],"modified":"2026-02-05T10:26:14.221736Z","published":"2026-02-05T08:38:41.246Z","database_specific":{"cpes":["cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*"],"severity":"Medium"},"references":[{"type":"WEB","url":"https://docs.djangoproject.com/en/dev/releases/security/"},{"type":"WEB","url":"https://groups.google.com/g/django-announce"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-1287"},{"type":"WEB","url":"https://www.djangoproject.com/weblog/2026/feb/03/security-releases/"}],"affected":[{"package":{"name":"django","ecosystem":"Bitnami","purl":"pkg:bitnami/django"},"ranges":[{"type":"SEMVER","events":[{"introduced":"4.2.0"},{"fixed":"4.2.28"},{"introduced":"5.2.0"},{"fixed":"5.2.11"},{"introduced":"6.0.0"},{"fixed":"6.0.2"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/django/BIT-django-2026-1287.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}]}],"schema_version":"1.7.3"}