ASGI header spoofing via underscore/hyphen conflation
Summary
| CVE | CVE-2026-3902 |
|---|---|
| State | PUBLISHED |
| Assigner | DSF |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-04-07 15:17:46 UTC |
| Updated | 2026-04-07 17:16:37 UTC |
| Description | An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. `ASGIRequest` allows a remote attacker to spoof headers by exploiting an ambiguous mapping of two header variants (with hyphens or with underscores) to a single version with underscores. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Tarek Nakkouch for reporting this issue. |
Risk And Classification
Primary CVSS: v3.1 7.5 HIGH from ADP
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Problem Types: CWE-290 | CWE-290 CWE-290: Authentication Bypass by Spoofing
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | ADP | DECLARED | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
HighAvailability
NoneCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Djangoproject | Django | affected 6.0 6.0.4 semver | Not specified |
| CNA | Djangoproject | Django | unaffected 6.0.4 semver | Not specified |
| CNA | Djangoproject | Django | affected 5.2 5.2.13 semver | Not specified |
| CNA | Djangoproject | Django | unaffected 5.2.13 semver | Not specified |
| CNA | Djangoproject | Django | affected 4.2 4.2.30 semver | Not specified |
| CNA | Djangoproject | Django | unaffected 4.2.30 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| groups.google.com/g/django-announce | 6a34fbeb-21d4-45e7-8e0a-62b95bc12c92 | groups.google.com | |
| docs.djangoproject.com/en/dev/releases/security | 6a34fbeb-21d4-45e7-8e0a-62b95bc12c92 | docs.djangoproject.com | |
| www.djangoproject.com/weblog/2026/apr/07/security-releases | 6a34fbeb-21d4-45e7-8e0a-62b95bc12c92 | www.djangoproject.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Tarek Nakkouch (en)
CNA: Jacob Walls (en)
CNA: Jacob Walls (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2025-12-23T12:00:00.000Z | Initial report received. |
| CNA | 2026-03-10T12:00:00.000Z | Vulnerability confirmed. |
| CNA | 2026-04-07T09:00:00.000Z | Security release issued. |
There are currently no legacy QID mappings associated with this CVE.