Description
Anymail django-anymail version version 0.2 through 1.3 contains a CWE-532, CWE-209 vulnerability in WEBHOOK_AUTHORIZATION setting value that can result in An attacker with access to error logs could fabricate email tracking events. This attack appear to be exploitable via If you have exposed your Django error reports, an attacker could discover your ANYMAIL_WEBHOOK setting and use this to post fabricated or malicious Anymail tracking/inbound events to your app. This vulnerability appears to have been fixed in v1.4.
References (2)
Core 2
Core References
Patch, Vendor Advisory x_refsource_misc
https://github.com/anymail/django-anymail/commit/1a6086f2b58478d71f89bf27eb034ed81aefe5ef
Release Notes x_refsource_misc
https://github.com/anymail/django-anymail/releases/tag/v1.4
Scores
CVSS v3
7.4
EPSS
0.0031
EPSS Percentile
53.8%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Details
CWE
CWE-532
Status
published
Products (2)
django-anymail_project/django-anymail
0.2 - 1.3
pypi/django-anymail
0.2 - 1.4PyPI
Published
Mar 13, 2018
Tracked Since
Feb 18, 2026