CVE-2026-35192
Publication date 5 May 2026
Last updated 14 May 2026
Ubuntu priority
Description
An issue was discovered in 6.0 before 6.0.5 and 5.2 before 5.2.14. Response headers do not vary on cookies if a session is not modified, but `SESSION_SAVE_EVERY_REQUEST` is `True`. A remote attacker can steal a user's session after that user visits a cached public page. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Cantina for reporting this issue.
Why is this CVE low priority?
Django developers have rated this to be a low-severity issue
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| python-django | 26.04 LTS resolute |
Fixed 3:5.2.9-0ubuntu4.1
|
| 25.10 questing |
Fixed 3:5.2.4-1ubuntu2.5
|
|
| 24.04 LTS noble |
Fixed 3:4.2.11-1ubuntu1.16
|
|
| 22.04 LTS jammy |
Fixed 2:3.2.12-2ubuntu1.27
|
|
| 20.04 LTS focal |
Needs evaluation
|
|
| 18.04 LTS bionic |
Needs evaluation
|
|
| 16.04 LTS xenial |
Needs evaluation
|
|
| 14.04 LTS trusty |
Needs evaluation
|
References
Related Ubuntu Security Notices (USN)
- USN-8232-1
- Django vulnerabilities
- 5 May 2026