GHSA-ffv6-jj46-x367

Suggest an improvement
Source
https://github.com/advisories/GHSA-ffv6-jj46-x367
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-ffv6-jj46-x367/GHSA-ffv6-jj46-x367.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-ffv6-jj46-x367
Aliases
Published
2026-03-11T00:11:08Z
Modified
2026-03-13T05:53:40.582630Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
django-unicorn affected by component state manipulation via unvalidated attribute access
Details

Summary

Component state manipulation is possible in django-unicorn due to missing access control checks during property updates and method calls. An attacker can bypass the intended _is_public protection to modify internal attributes such as template_name or trigger protected methods.

Vulnerability Details: Component Access Control Bypass

Security analysis identified that the framework fails to enforce visibility boundaries defined by _is_public within the action parsers. Specifically, the logic in set_property_value() and _call_method_name() utilizes getattr and setattr directly on component instances without verifying if the target attribute or method is explicitly marked as public.

Vulnerability resides in: - src/django_unicorn/views/action_parsers/call_method.py - src/django_unicorn/views/action_parsers/utils.py

While Django's template engine restricts rendering to registered directories, an unauthorized user can still force a component to render sensitive templates (e.g., admin layouts) from other installed applications or reset the component state by invoking the internal reset() method.

Proof of Concept (PoC)

Attacker can overwrite the template_name attribute by sending a crafted JSON payload to the message endpoint:

  1. Construct a payload targeting a protected attribute:
    {
      "actionQueue": [
        {
          "type": "syncInput",
          "payload": { "name": "template_name", "value": "admin/base.html" }
        }
      ],
      "data": {},
      "meta": "<checksum_of_empty_dict>"
    }
    
  2. The server-side component updates its internal state: self.template_name = "admin/base.html".
  3. Subsequent re-rendering displays the content of the targeted template, bypassing intended component logic.

Impact

Low severity. The risk is limited to unauthorized manipulation of component state and rendering of existing templates within the application's configured template directories. Remote Code Execution (RCE) is not possible via this vector.

Database specific
{
    "severity": "MODERATE",
    "github_reviewed": true,
    "nvd_published_at": "2026-03-10T22:16:19Z",
    "cwe_ids": [
        "CWE-284",
        "CWE-915"
    ],
    "github_reviewed_at": "2026-03-11T00:11:08Z"
}
References

Affected packages

PyPI / django-unicorn

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.67.0

Affected versions

0.*
0.1.0
0.1.1
0.2.0
0.2.1
0.2.2
0.2.3
0.3.0
0.4.0
0.5.0
0.6.0
0.6.1
0.6.2
0.6.3
0.6.4
0.6.5
0.7.0
0.7.1
0.8.0
0.9.0
0.9.1
0.9.2
0.9.3
0.9.4
0.10.0
0.10.1
0.11.0
0.11.1
0.11.2
0.12.0
0.13.0
0.14.0
0.14.1
0.15.0
0.15.1
0.16.0
0.16.1
0.17.0
0.17.1
0.17.2
0.18.0
0.18.1
0.19.0
0.20.0
0.21.0
0.21.2
0.22.0
0.23.0
0.24.0
0.25.0
0.26.0
0.27.0
0.27.1
0.27.2
0.28.0
0.29.0
0.30.0
0.31.0
0.32.0
0.33.0
0.34.0
0.35.0
0.35.2
0.35.3
0.36.0
0.36.1
0.37.0
0.37.1
0.37.2
0.38.0
0.38.1
0.39.0
0.39.1
0.40.0
0.41.0
0.41.1
0.41.2
0.42.0
0.42.1
0.43.0
0.43.1
0.44.0
0.44.1
0.45.0
0.45.1
0.46.0
0.47.0
0.48.0
0.49.0
0.49.1
0.49.2
0.50.0
0.51.0
0.51.1
0.52.0
0.53.0
0.54.0
0.55.0
0.56.0
0.56.1
0.57.0
0.57.1
0.58.0
0.58.1
0.59.0
0.60.0
0.61.0
0.62.0
0.63.3
0.64.0
0.65.0
0.65.2
0.66.1

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/03/GHSA-ffv6-jj46-x367/GHSA-ffv6-jj46-x367.json"