CVE-2026-1287: Django has an SQL Injection issue
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
FilteredRelation is subject to SQL injection in column aliases via control characters, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to QuerySet methods annotate(), aggregate(), extra(), values(), values_list(), and alias(). Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Solomon Kebede for reporting this issue.
References
- docs.djangoproject.com/en/dev/releases/security
- github.com/advisories/GHSA-gvg8-93h5-g6qq
- github.com/django/django
- github.com/django/django/commit/e891a84c7ef9962bfcc3b4685690219542f86a22
- groups.google.com/g/django-announce
- nvd.nist.gov/vuln/detail/CVE-2026-1287
- www.djangoproject.com/weblog/2026/feb/03/security-releases
Code Behaviors & Features
Detect and mitigate CVE-2026-1287 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →