Vulnerability Description
AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, when following redirects to a different origin, aiohttp drops the Authorization header, but retains the Cookie and Proxy-Authorization headers. This issue has been patched in version 3.13.4.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Aiohttp | Aiohttp | < 3.13.4 |
Related Weaknesses (CWE)
References
- https://github.com/aio-libs/aiohttp/commit/5351c980dcec7ad385730efdf4e1f4338b24fPatch
- https://github.com/aio-libs/aiohttp/releases/tag/v3.13.4Release Notes
- https://github.com/aio-libs/aiohttp/security/advisories/GHSA-966j-vmvw-g2g9PatchVendor Advisory
FAQ
What is CVE-2026-34518?
CVE-2026-34518 is a vulnerability with a CVSS score of 5.3 (MEDIUM). AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, when following redirects to a different origin, aiohttp drops the Authorization header, but ret...
How severe is CVE-2026-34518?
CVE-2026-34518 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-34518?
Check the references section above for vendor advisories and patch information. Affected products include: Aiohttp Aiohttp.