Vulnerability Description
AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.12.14, the Python parser is vulnerable to a request smuggling vulnerability due to not parsing trailer sections of an HTTP request. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.12.14 contains a patch for this issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Aiohttp | Aiohttp | < 3.12.14 |
Related Weaknesses (CWE)
References
- https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2Patch
- https://github.com/aio-libs/aiohttp/security/advisories/GHSA-9548-qrrj-x5pjVendor Advisory
FAQ
What is CVE-2025-53643?
CVE-2025-53643 is a vulnerability with a CVSS score of 7.5 (HIGH). AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.12.14, the Python parser is vulnerable to a request smuggling vulnerability due to not parsing traile...
How severe is CVE-2025-53643?
CVE-2025-53643 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-53643?
Check the references section above for vendor advisories and patch information. Affected products include: Aiohttp Aiohttp.