We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53643

AIOHTTP is vulnerable to HTTP Request/Response Smuggling through incorrect parsing of chunked trailer sections



Description

AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.12.14, the Python parser is vulnerable to a request smuggling vulnerability due to not parsing trailer sections of an HTTP request. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.12.14 contains a patch for this issue.

Reserved 2025-07-07 | Published 2025-07-14 | Updated 2025-07-14 | Assigner GitHub_M


LOW: 1.7CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U

Problem types

CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Product status

< 3.12.14
affected

References

github.com/...iohttp/security/advisories/GHSA-9548-qrrj-x5pj

github.com/...ommit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a

cve.org (CVE-2025-53643)

nvd.nist.gov (CVE-2025-53643)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53643

Support options

Helpdesk Chat, Email, Knowledgebase