Vigilance.fr - djoser: user access via Custom Authentication Checks, analyzed on 21/02/2025
An attacker can bypass restrictions of djoser, via Custom Authentication Checks, in order to gain user privileges. - Security Vulnerability

An attacker can bypass restrictions of djoser, via Custom Authentication Checks, in order to gain user privileges.