CVE-2025-48383: Django-Select2 Vulnerable to Widget Instance Secret Cache Key Leaking

8.2 CVSS

Description

Django-Select2 is a Django integration for Select2. Prior to version 8.4.1, instances of HeavySelect2Mixin subclasses like the ModelSelect2MultipleWidget and ModelSelect2Widget can leak secret access tokens across requests. This can allow users to access restricted query sets and restricted data. This issue has been patched in version 8.4.1.

Classification

CVE ID: CVE-2025-48383

CVSS Base Severity: HIGH

CVSS Base Score: 8.2

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem Types

CWE-402: Transmission of Private Resources into a New Sphere ('Resource Leak') CWE-918: Server-Side Request Forgery (SSRF)

Affected Products

Vendor: codingjoe

Product: django-select2

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.1% (scored less or equal to compared to others)

EPSS Date: 2025-06-08 (when was this score calculated)

Stakeholder-Specific Vulnerability Categorization (SSVC)

SSVC Exploitation: none

SSVC Technical Impact: partial

SSVC Automatable: true

References

https://nvd.nist.gov/vuln/detail/CVE-2025-48383
https://github.com/codingjoe/django-select2/security/advisories/GHSA-wjrh-hj83-3wh7
https://github.com/codingjoe/django-select2/commit/e5f41e6edba004d35f94915ff5e2559f44853412

Timeline