AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below allow for an infinite loop to occur when assert statements are bypassed, resulting in a DoS attack when processing a POST body. If optimizations are enabled (-O or PYTHONOPTIMIZE=1), and the application includes a handler that uses the Request.post() method, then an attacker may be able to execute a DoS attack with a specially crafted message. This issue is fixed in version 3.13.3.
References
Configurations
History
14 Jan 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Aiohttp aiohttp
Aiohttp |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | () https://github.com/aio-libs/aiohttp/commit/bc1319ec3cbff9438a758951a30907b072561259 - Patch | |
| References | () https://github.com/aio-libs/aiohttp/security/advisories/GHSA-jj3x-wxrx-4x23 - Vendor Advisory | |
| CPE | cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:* |
06 Jan 2026, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-06 00:15
Updated : 2026-01-14 19:16
NVD link : CVE-2025-69227
Mitre link : CVE-2025-69227
CVE.ORG link : CVE-2025-69227
JSON object : View
Products Affected
aiohttp
- aiohttp
CWE
CWE-835
Loop with Unreachable Exit Condition ('Infinite Loop')
