CVE-2026-1312: Django has an SQL Injection issue
An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
.QuerySet.order_by() is subject to SQL injection in column aliases containing periods when the same alias is, using a suitably crafted dictionary, with dictionary expansion, used in FilteredRelation. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Solomon Kebede for reporting this issue.
References
- docs.djangoproject.com/en/dev/releases/security
- github.com/advisories/GHSA-6426-9fv3-65x8
- github.com/django/django
- github.com/django/django/commit/005d60d97c4dfb117503bdb6f2facfcaf9315d84
- github.com/django/django/commit/69065ca869b0970dff8fdd8fafb390bf8b3bf222
- groups.google.com/g/django-announce
- nvd.nist.gov/vuln/detail/CVE-2026-1312
- www.djangoproject.com/weblog/2026/feb/03/security-releases
Code Behaviors & Features
Detect and mitigate CVE-2026-1312 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →