CVE-2026-4277
Publication date 7 April 2026
Last updated 8 April 2026
Ubuntu priority
Description
An issue was discovered in 6.0 before 6.0.4, 5.2 before 5.2.13, and 4.2 before 4.2.30. Add permissions on inline model instances were not validated on submission of forged `POST` data in `GenericInlineModelAdmin`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank N05ec@LZU-DSLab for reporting this issue.
Why is this CVE low priority?
Django developers have rated this as being a low severity issue
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| python-django | 25.10 questing |
Fixed 3:5.2.4-1ubuntu2.4
|
| 24.04 LTS noble |
Fixed 3:4.2.11-1ubuntu1.15
|
|
| 22.04 LTS jammy |
Fixed 2:3.2.12-2ubuntu1.26
|
|
| 20.04 LTS focal |
Fixed 2:2.2.12-1ubuntu0.29+esm8
|
|
| 18.04 LTS bionic |
Fixed 1:1.11.11-1ubuntu1.21+esm15
|
|
| 16.04 LTS xenial |
Needs evaluation
|
|
| 14.04 LTS trusty | Ignored changes too intrusive |
Get expanded security coverage with Ubuntu Pro
Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.
Get Ubuntu Pro 30-day free trialReferences
Related Ubuntu Security Notices (USN)
- USN-8154-1
- Django vulnerabilities
- 7 April 2026