SQL Injection Vulnerability in Django RasterField of PostGIS
CVE-2026-1207

5.4MEDIUM

Key Information:

Status
Vendor
CVE Published:
3 February 2026

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2026-1207?

A vulnerability has been identified that affects certain versions of Django's RasterField, primarily utilized in PostGIS. This issue allows remote attackers to execute SQL injection attacks via manipulation of the band index parameter. Specifically, problematic versions include Django 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28. Legacy Django series such as 5.0.x, 4.1.x, and 3.2.x may also be at risk, prompting users to update to the latest versions as a precaution. Django thanks Tarek Nakkouch for reporting this critical issue.

Affected Version(s)

Django 6.0 < 6.0.2

Django 5.2 < 5.2.11

Django 4.2 < 4.2.28

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
5.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Tarek Nakkouch
Jacob Walls
Jacob Walls
.