CVE-2026-5766
Publication date 5 May 2026
Last updated 13 May 2026
Ubuntu priority
Cvss 3 Severity Score
Description
An issue was discovered in 6.0 before 6.0.5 and 5.2 before 5.2.14. ASGI requests with a missing or understated `Content-Length` header can bypass the `FILE_UPLOAD_MAX_MEMORY_SIZE` limit, potentially loading large files into memory and causing service degradation. As a reminder, Django expects a limit to be configured at the web server level rather than solely relying on `FILE_UPLOAD_MAX_MEMORY_SIZE`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Kyle Agronick for reporting this issue.
Why is this CVE low priority?
Django developers have rated this to be a low-severity issue
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| python-django | 26.04 LTS resolute |
Fixed 3:5.2.9-0ubuntu4.1
|
| 25.10 questing |
Fixed 3:5.2.4-1ubuntu2.5
|
|
| 24.04 LTS noble |
Fixed 3:4.2.11-1ubuntu1.16
|
|
| 22.04 LTS jammy |
Fixed 2:3.2.12-2ubuntu1.27
|
|
| 20.04 LTS focal |
Needs evaluation
|
|
| 18.04 LTS bionic |
Needs evaluation
|
|
| 16.04 LTS xenial |
Needs evaluation
|
|
| 14.04 LTS trusty |
Needs evaluation
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | None |
| Availability impact | Low |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
References
Related Ubuntu Security Notices (USN)
- USN-8232-1
- Django vulnerabilities
- 5 May 2026