AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below of the Python HTTP parser may allow a request smuggling attack with the presence of non-ASCII characters. If a pure Python version of AIOHTTP is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. This issue is fixed in version 3.13.3.
References
| Link | Resource |
|---|---|
| https://github.com/aio-libs/aiohttp/commit/32677f2adfd907420c078dda6b79225c6f4ebce0 | Patch |
| https://github.com/aio-libs/aiohttp/security/advisories/GHSA-69f9-5gxw-wvc2 | Vendor Advisory Patch |
Configurations
History
No history.
Information
Published : 2026-01-05 23:15
Updated : 2026-01-14 19:12
NVD link : CVE-2025-69224
Mitre link : CVE-2025-69224
CVE.ORG link : CVE-2025-69224
JSON object : View
Products Affected
aiohttp
- aiohttp
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
