Vulnerability Description
h11 is a Python implementation of HTTP/1.1. Prior to version 0.16.0, a leniency in h11's parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities under certain conditions. This issue has been patched in version 0.16.0. Since exploitation requires the combination of buggy h11 with a buggy (reverse) proxy, fixing either component is sufficient to mitigate this issue.
CVSS Score
CRITICAL
Related Weaknesses (CWE)
References
- https://github.com/python-hyper/h11/commit/114803a29ce50116dc47951c690ad4892b1a3
- https://github.com/python-hyper/h11/security/advisories/GHSA-vqfr-h8mv-ghfj
FAQ
What is CVE-2025-43859?
CVE-2025-43859 is a vulnerability with a CVSS score of 9.1 (CRITICAL). h11 is a Python implementation of HTTP/1.1. Prior to version 0.16.0, a leniency in h11's parsing of line terminators in chunked-coding message bodies can lead to request smuggling vulnerabilities unde...
How severe is CVE-2025-43859?
CVE-2025-43859 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-43859?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.