CVE-2025-53643
ADVISORY - githubSummary
Summary
The Python parser is vulnerable to a request smuggling vulnerability due to not parsing trailer sections of an HTTP request.
Impact
If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections.
Patch: https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a
Common Weakness Enumeration (CWE)
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
NIST
3.9
CVSS SCORE
1.7lowGitHub
-
CVSS SCORE
1.7lowDebian
-
Ubuntu
3.9
CVSS SCORE
7.5mediumChainguard
CGA-4j8q-668c-5jqg
-
Chainguard
CGA-9qh3-hfch-g4rf
-
Chainguard
CGA-f59m-6vrr-qp9v
-
Chainguard
CGA-m93h-jwc7-8m37
-
Chainguard
CGA-mqw7-jwx7-849x
-
Chainguard
CGA-w2fp-6749-5q82
-
Chainguard
CGA-wg4h-5943-6pf5
-