Metrics
Affected Vendors & Products
Wed, 14 Jan 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 06 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 Jan 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aio-libs
Aio-libs aiohttp Session Aio-libs Project Aio-libs Project aiohttp Aiohttp Aiohttp aio-libs Aiohttp aiohttp |
|
| Vendors & Products |
Aio-libs
Aio-libs aiohttp Session Aio-libs Project Aio-libs Project aiohttp Aiohttp Aiohttp aio-libs Aiohttp aiohttp |
Tue, 06 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 05 Jan 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. In versions 3.13.2 and below, handling of chunked messages can result in excessive blocking CPU usage when receiving a large number of chunks. If an application makes use of the request.read() method in an endpoint, it may be possible for an attacker to cause the server to spend a moderate amount of blocking CPU time (e.g. 1 second) while processing the request. This could potentially lead to DoS as the server would be unable to handle other requests during that time. This issue is fixed in version 3.13.3. | |
| Title | AIOHTTP vulnerable to DoS through chunked messages | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-01-05T23:37:52.955Z
Updated: 2026-01-06T19:02:09.630Z
Reserved: 2025-12-29T20:53:34.537Z
Link: CVE-2025-69229
Updated: 2026-01-06T14:24:48.256Z
Status : Analyzed
Published: 2026-01-06T00:15:48.347
Modified: 2026-01-14T19:17:34.960
Link: CVE-2025-69229