Vulnerability Description
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Python | Python | < 3.10.20 |
Related Weaknesses (CWE)
References
- https://github.com/python/cpython/commit/14b1fdb0a94b96f86fc7b86671ea9582b867662Patch
- https://github.com/python/cpython/commit/289f29b0fe38baf2d7cb5854f4bb573cc34a6a1Patch
- https://github.com/python/cpython/commit/4ce27904b597c77d74dd93f2c912676021a9915Patch
- https://github.com/python/cpython/commit/5a4c4a033a4a54481be6870aa1896fad732555bPatch
- https://github.com/python/cpython/commit/5dc101675fd22918facbbe0fecdc821502beaafPatch
- https://github.com/python/cpython/commit/afc40bdd3dd71f343fd9016f6d8eebbacbd6587Patch
- https://github.com/python/cpython/issues/119451Issue TrackingPatch
- https://github.com/python/cpython/pull/119454Issue TrackingPatch
- https://mail.python.org/archives/list/[email protected]/thread/OQ6G7MVendor Advisory
FAQ
What is CVE-2025-13836?
CVE-2025-13836 is a vulnerability with a CVSS score of 7.5 (HIGH). When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amount...
How severe is CVE-2025-13836?
CVE-2025-13836 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-13836?
Check the references section above for vendor advisories and patch information. Affected products include: Python Python.