The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-42196

CVE-2026-42196: django-s3file Path Traversal Vulnerability

CVE-2026-42196 is a path traversal flaw in django-s3file that allows attackers to escape pre-signed upload locations and load files from unauthorized locations. This article covers technical details, affected versions, and patches.

Published: May 17, 2026

CVE-2026-42196 Overview

CVE-2026-42196 is a relative path traversal vulnerability in django-s3file, a lightweight file upload input for Django and Amazon S3. Versions prior to 7.0.2 ship a vulnerable S3FileMiddleware that fails to validate upload paths supplied in requests. Attackers can craft modified requests to escape pre-signed upload locations and force the Django application to load arbitrary S3 objects into request.FILES. Depending on how the application processes uploaded files, this leads to confidentiality and integrity impacts on data stored in the connected S3 bucket. The issue is tracked under [CWE-22] and is fixed in version 7.0.2.

Critical Impact

Unauthenticated network attackers can manipulate file upload requests to load arbitrary S3 objects into Django views, exposing or corrupting bucket contents.

Affected Products

  • django-s3file versions prior to 7.0.2
  • Django applications using S3FileMiddleware with Amazon S3 backends
  • Deployments relying on pre-signed S3 upload URLs through django-s3file

Discovery Timeline

  • 2026-05-12 - CVE-2026-42196 published to NVD
  • 2026-05-13 - Last updated in NVD database

Technical Details for CVE-2026-42196

Vulnerability Analysis

The django-s3file package implements direct-to-S3 uploads by issuing pre-signed POST URLs to the browser. After the client uploads the file directly to S3, the browser sends a follow-up request to the Django backend referencing the S3 object key. The S3FileMiddleware then fetches the referenced object and injects it into request.FILES so the Django view can process it as if it were a standard multipart upload.

The middleware trusts the object key supplied by the client without enforcing that the key remains within the pre-signed upload prefix. An attacker can submit a relative path that traverses outside the intended location, causing the middleware to load a different S3 object into request.FILES. The application then processes attacker-chosen content as a legitimate upload.

Root Cause

The root cause is insufficient path validation in S3FileMiddleware when resolving client-supplied object keys against the pre-signed upload location. Relative path segments are not normalized or constrained, allowing escape from the upload prefix and arbitrary object selection within the bucket.

Attack Vector

Exploitation requires network access to a Django endpoint that uses S3FileMiddleware. No authentication or user interaction is required when the upload form itself is reachable anonymously. The attacker initiates a normal upload flow, then modifies the file reference returned to the backend with traversal sequences pointing at sensitive bucket keys. The view receives the attacker-selected object as request.FILES, which may be persisted, served back, or used to overwrite trusted records. See the GitHub Security Advisory GHSA-67qg-7284-2277 for technical details.

Detection Methods for CVE-2026-42196

Indicators of Compromise

  • Upload requests containing ../ sequences, URL-encoded traversal patterns, or absolute keys in fields consumed by S3FileMiddleware.
  • S3 access logs showing GetObject calls from the Django application role against keys outside configured pre-signed upload prefixes.
  • request.FILES entries in application logs that reference object keys inconsistent with the user's session or form context.

Detection Strategies

  • Inspect Django access logs and WAF telemetry for path traversal patterns on endpoints that route through S3FileMiddleware.
  • Correlate S3 server access logs with application upload events to flag object reads outside expected upload directories.
  • Audit installed Python dependencies and identify hosts running django-s3file below 7.0.2.

Monitoring Recommendations

  • Enable S3 bucket access logging and CloudTrail data events for the buckets backing django-s3file uploads.
  • Alert on Django application role activity that reads keys outside the documented upload prefix.
  • Track deployments of vulnerable django-s3file versions in software bill of materials inventories.

How to Mitigate CVE-2026-42196

Immediate Actions Required

  • Upgrade django-s3file to version 7.0.2 or later across all Django services.
  • Review S3 access logs since deployment of vulnerable versions for unexpected GetObject calls by the Django application role.
  • Restrict the IAM policy bound to the Django application so it can only read and write keys under the intended upload prefix.

Patch Information

The maintainers fixed this issue in django-s3file7.0.2. The patch enforces that resolved S3 object keys remain within the pre-signed upload location before injecting them into request.FILES. Refer to the GitHub Security Advisory GHSA-67qg-7284-2277 for advisory details and upgrade instructions.

Workarounds

  • If upgrading immediately is not possible, tighten the S3 bucket policy and IAM role to limit reads strictly to the upload prefix.
  • Place a WAF rule in front of upload endpoints to reject requests containing ../, ..\, or URL-encoded traversal sequences in form fields.
  • Validate within Django views that any key returned by S3FileMiddleware matches the expected per-user or per-session prefix before processing the file.
bash
# Configuration example: upgrade django-s3file to the fixed release
pip install --upgrade 'django-s3file>=7.0.2'
pip show django-s3file | grep -i version

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePath Traversal

  • Vendor/TechDjango

  • SeverityCRITICAL

  • CVSS Score9.9

  • EPSS Probability0.08%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-22
  • Technical References
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2021-45452: Django Path Traversal Vulnerability

  • CVE-2026-6580: DjangoBlog Hard-Coded Key Vulnerability

  • CVE-2026-6576: DjangoBlog Command Injection Vulnerability

  • CVE-2026-6578: DjangoBlog Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English