← Retour aux CVEs
CVE-2025-69227
HIGH7.5
Description
AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below allow for an infinite loop to occur when assert statements are bypassed, resulting in a DoS attack when processing a POST body. If optimizations are enabled (-O or PYTHONOPTIMIZE=1), and the application includes a handler that uses the Request.post() method, then an attacker may be able to execute a DoS attack with a specially crafted message. This issue is fixed in version 3.13.3.
Details CVE
Score CVSS v3.17.5
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie1/6/2026
Derniere modification1/14/2026
Sourcenvd
Observations honeypot0
Produits affectes
aiohttp:aiohttp
Faiblesses (CWE)
CWE-835
References
https://github.com/aio-libs/aiohttp/commit/bc1319ec3cbff9438a758951a30907b072561259(security-advisories@github.com)
https://github.com/aio-libs/aiohttp/security/advisories/GHSA-jj3x-wxrx-4x23(security-advisories@github.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.