CVE-2026-34519
ADVISORY - githubSummary
Summary
An attacker who controls the reason parameter when creating a Response may be able to inject extra headers or similar exploits.
Impact
In the unlikely situation that an application allows untrusted data to be used in the response's reason parameter, then an attacker could manipulate the response to send something different from what the developer intended.
Patch: https://github.com/aio-libs/aiohttp/commit/53b35a2f8869c37a133e60bf1a82a1c01642ba2b
EPSS Score: 0.00045 (0.138)
Common Weakness Enumeration (CWE)
ADVISORY - nist
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
ADVISORY - github
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
ADVISORY - redhat
Improper Validation of Syntactic Correctness of Input
NIST
CREATED
UPDATED
ADVISORY IDCVE-2026-34519
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
2.7lowGitHub
CREATED
UPDATED
ADVISORY IDGHSA-mwh4-6h8g-pg8w
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
2.7lowDebian
CREATED
UPDATED
ADVISORY IDCVE-2026-34519
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
Ubuntu
CREATED
UPDATED
ADVISORY IDCVE-2026-34519
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-
CVSS SCORE
N/AmediumRed Hat
CREATED
UPDATED
ADVISORY IDCVE-2026-34519
EXPLOITABILITY SCORE
3.9
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)
CVSS SCORE
5.3mediumChainguard
CREATED
UPDATED
ADVISORY ID
CGA-8cvv-36q4-wwx8
EXPLOITABILITY SCORE
-
EXPLOITS FOUND
-
COMMON WEAKNESS ENUMERATION (CWE)-