CVE-2025-58068

Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eventlet:eventlet:*:*:*:*:*:*:*:*

History

24 Sep 2025, 18:16

Type Values Removed Values Added
References () https://github.com/eventlet/eventlet/commit/0bfebd1117d392559e25b4bfbfcc941754de88fb - () https://github.com/eventlet/eventlet/commit/0bfebd1117d392559e25b4bfbfcc941754de88fb - Patch
References () https://github.com/eventlet/eventlet/pull/1062 - () https://github.com/eventlet/eventlet/pull/1062 - Issue Tracking
References () https://github.com/eventlet/eventlet/security/advisories/GHSA-hw6f-rjfj-j7j7 - () https://github.com/eventlet/eventlet/security/advisories/GHSA-hw6f-rjfj-j7j7 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1
CPE cpe:2.3:a:eventlet:eventlet:*:*:*:*:*:*:*:*
First Time Eventlet
Eventlet eventlet

29 Aug 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-29 22:15

Updated : 2025-09-24 18:16


NVD link : CVE-2025-58068

Mitre link : CVE-2025-58068

CVE.ORG link : CVE-2025-58068


JSON object : View

Products Affected

eventlet

  • eventlet
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')