CVE-2025-53643

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-53643
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-53643.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-53643
Aliases
Downstream
Related
Published
2025-07-14T21:15:27Z
Modified
2025-07-15T14:46:08.466094Z
Summary
[none]
Details

AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.12.14, the Python parser is vulnerable to a request smuggling vulnerability due to not parsing trailer sections of an HTTP request. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTPNOEXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.12.14 contains a patch for this issue.

References

Affected packages

Debian:11 / python-aiohttp

Package

Name
python-aiohttp
Purl
pkg:deb/debian/python-aiohttp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.7.4-1
3.7.4-1+deb11u1
3.7.4-2
3.8.1-1
3.8.1-2
3.8.1-3
3.8.1-4
3.8.1-5
3.8.3-1
3.8.4-1
3.8.5-1
3.8.6-1
3.9.1-1
3.9.5-1
3.10.0-1
3.10.1-1
3.10.3-1
3.10.3-2
3.10.3-3
3.10.4-1
3.10.5-1
3.10.6-1
3.10.8-1
3.10.10-1
3.10.10-2
3.10.11-1
3.11.15-1
3.11.16-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / python-aiohttp

Package

Name
python-aiohttp
Purl
pkg:deb/debian/python-aiohttp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.8.4-1
3.8.4-1+deb12u1
3.8.5-1
3.8.6-1
3.9.1-1
3.9.5-1
3.10.0-1
3.10.1-1
3.10.3-1
3.10.3-2
3.10.3-3
3.10.4-1
3.10.5-1
3.10.6-1
3.10.8-1
3.10.10-1
3.10.10-2
3.10.11-1
3.11.15-1
3.11.16-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / python-aiohttp

Package

Name
python-aiohttp
Purl
pkg:deb/debian/python-aiohttp?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*

3.8.4-1
3.8.5-1
3.8.6-1
3.9.1-1
3.9.5-1
3.10.0-1
3.10.1-1
3.10.3-1
3.10.3-2
3.10.3-3
3.10.4-1
3.10.5-1
3.10.6-1
3.10.8-1
3.10.10-1
3.10.10-2
3.10.11-1
3.11.15-1
3.11.16-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}