| 0 |
| url |
VCID-19q4-vzzb-8uca |
| vulnerability_id |
VCID-19q4-vzzb-8uca |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34519 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1165 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11778 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1181 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11732 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13732 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18287 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18268 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18323 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18375 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18422 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18423 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1837 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34519 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34519, GHSA-mwh4-6h8g-pg8w
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-19q4-vzzb-8uca |
|
| 1 |
| url |
VCID-5f1f-mrwv-zucz |
| vulnerability_id |
VCID-5f1f-mrwv-zucz |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34513 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12245 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16263 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16369 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16335 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16315 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16386 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16218 |
| published_at |
2026-04-29T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16259 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16485 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.165 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34513 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34513, GHSA-hcc4-c3v8-rx92
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-5f1f-mrwv-zucz |
|
| 2 |
| url |
VCID-cg9h-fysf-xygf |
| vulnerability_id |
VCID-cg9h-fysf-xygf |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34516 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11462 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.1533 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15325 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15391 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.1543 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15468 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0005 |
| scoring_system |
epss |
| scoring_elements |
0.15418 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16335 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16259 |
| published_at |
2026-04-26T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16263 |
| published_at |
2026-04-24T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16369 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16315 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16218 |
| published_at |
2026-04-29T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34516 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
|
| 1 |
| value |
6.6 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34516, GHSA-m5qp-6w8w-w647
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cg9h-fysf-xygf |
|
| 3 |
| url |
VCID-d3pa-kwgz-vuag |
| vulnerability_id |
VCID-d3pa-kwgz-vuag |
| summary |
AIOHTTP vulnerable to denial of service through large payloads
### Summary
A request can be crafted in such a way that an aiohttp server's memory fills up uncontrollably during processing.
### Impact
If an application includes a handler that uses the `Request.post()` method, an attacker may be able to freeze the server by exhausting the memory.
-----
Patch: https://github.com/aio-libs/aiohttp/commit/b7dbd35375aedbcd712cbae8ad513d56d11cce60 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69228 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1943 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19467 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19479 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19584 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19572 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19565 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19637 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19835 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19689 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19587 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19782 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19646 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19695 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69228 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69228, GHSA-6jhg-hg63-jvvf
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-d3pa-kwgz-vuag |
|
| 4 |
| url |
VCID-drqp-x9gc-2qd3 |
| vulnerability_id |
VCID-drqp-x9gc-2qd3 |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34518 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11175 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11236 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11208 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11277 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11337 |
| published_at |
2026-04-21T12:55:00Z |
|
| 5 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12245 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16325 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16386 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16485 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.165 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16441 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34518 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34518, GHSA-966j-vmvw-g2g9
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-drqp-x9gc-2qd3 |
|
| 5 |
| url |
VCID-ekqy-23wg-5ugu |
| vulnerability_id |
VCID-ekqy-23wg-5ugu |
| summary |
In aiohttp, compressed files as symlinks are not protected from path traversal
### Summary
Static routes which contain files with compressed variants (`.gz` or `.br` extension) were vulnerable to path traversal outside the root directory if those variants are symbolic links.
### Details
The server protects static routes from path traversal outside the root directory when `follow_symlinks=False` (default). It does this by resolving the requested URL to an absolute path and then checking that path relative to the root. However, these checks are not performed when looking for compressed variants in the `FileResponse` class, and symbolic links are then automatically followed when performing `Path.stat()` and `Path.open()` to send the file.
### Impact
Servers with static routes that contain compressed variants as symbolic links, pointing outside the root directory, or that permit users to upload or create such links, are impacted.
----
Patch: https://github.com/aio-libs/aiohttp/pull/8653/files |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-42367 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57586 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57607 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57587 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57629 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57655 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57625 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57645 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57665 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.5765 |
| published_at |
2026-04-18T12:55:00Z |
|
| 9 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57593 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57618 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57646 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57597 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-42367 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://github.com/aio-libs/aiohttp/pull/8653 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N |
|
| 1 |
| value |
6.3 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-09T18:18:15Z/ |
|
|
| url |
https://github.com/aio-libs/aiohttp/pull/8653 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/python-aiohttp@3.11.16-1 |
| purl |
pkg:deb/debian/python-aiohttp@3.11.16-1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 6 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 7 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 8 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 9 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 10 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 11 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 12 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 13 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 14 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 15 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 16 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 17 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.11.16-1 |
|
|
| aliases |
CVE-2024-42367, GHSA-jwhx-xcg6-8xhj
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ekqy-23wg-5ugu |
|
| 6 |
| url |
VCID-ft9z-nd6x-27dz |
| vulnerability_id |
VCID-ft9z-nd6x-27dz |
| summary |
AIOHTTP has unicode match groups in regexes for ASCII protocol elements
### Summary
The parser allows non-ASCII decimals to be present in the Range header.
### Impact
There is no known impact, but there is the possibility that there's a method to exploit a request smuggling vulnerability.
----
Patch: https://github.com/aio-libs/aiohttp/commit/c7b7a044f88c71cefda95ec75cdcfaa4792b3b96 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69225 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13843 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.1391 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13936 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13935 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14126 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13932 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14014 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14067 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14022 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13985 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13905 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.14072 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13833 |
| published_at |
2026-04-18T12:55:00Z |
|
| 13 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13839 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69225 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69225, GHSA-mqqc-3gqh-h2x8
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ft9z-nd6x-27dz |
|
| 7 |
| url |
VCID-g4rj-1kzy-pkft |
| vulnerability_id |
VCID-g4rj-1kzy-pkft |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34525 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24814 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00085 |
| scoring_system |
epss |
| scoring_elements |
0.24852 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27783 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27825 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.2782 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27777 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27709 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27734 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.001 |
| scoring_system |
epss |
| scoring_elements |
0.27726 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30498 |
| published_at |
2026-04-29T12:55:00Z |
|
| 10 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30894 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.3086 |
| published_at |
2026-04-21T12:55:00Z |
|
| 12 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30698 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00119 |
| scoring_system |
epss |
| scoring_elements |
0.30582 |
| published_at |
2026-04-26T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34525 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34525, GHSA-c427-h43c-vf67
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-g4rj-1kzy-pkft |
|
| 8 |
| url |
VCID-hyh4-58xy-xfge |
| vulnerability_id |
VCID-hyh4-58xy-xfge |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34517 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.12245 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15771 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15744 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15753 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15796 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15817 |
| published_at |
2026-04-24T12:55:00Z |
|
| 7 |
| value |
0.00051 |
| scoring_system |
epss |
| scoring_elements |
0.15814 |
| published_at |
2026-04-26T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16485 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16446 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16355 |
| published_at |
2026-04-07T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16441 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.165 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16386 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34517 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34517, GHSA-3wq7-rqq7-wx6j
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hyh4-58xy-xfge |
|
| 9 |
| url |
VCID-jxqg-x9dh-z3hb |
| vulnerability_id |
VCID-jxqg-x9dh-z3hb |
| summary |
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Security-sensitive parts of the Python HTTP parser retained minor differences in allowable character sets, that must trigger error handling to robustly match frame boundaries of proxies in order to protect against injection of additional requests. Additionally, validation could trigger exceptions that were not handled consistently with processing of other malformed input. Being more lenient than internet standards require could, depending on deployment environment, assist in request smuggling. The unhandled exception could cause excessive resource consumption on the application server and/or its logging facilities. This vulnerability exists due to an incomplete fix for CVE-2023-47627. Version 3.9.2 fixes this vulnerability. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-23829 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64834 |
| published_at |
2026-04-24T12:55:00Z |
|
| 1 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64843 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64847 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00475 |
| scoring_system |
epss |
| scoring_elements |
0.64816 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.6659 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66588 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66617 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66674 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.6666 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66624 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66657 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66669 |
| published_at |
2026-04-11T12:55:00Z |
|
| 12 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.6665 |
| published_at |
2026-04-09T12:55:00Z |
|
| 13 |
| value |
0.00515 |
| scoring_system |
epss |
| scoring_elements |
0.66636 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-23829 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 5 |
|
| 6 |
|
| 7 |
| reference_url |
https://github.com/aio-libs/aiohttp/pull/8074 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-02-01T16:40:08Z/ |
|
|
| url |
https://github.com/aio-libs/aiohttp/pull/8074 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/python-aiohttp@3.11.16-1 |
| purl |
pkg:deb/debian/python-aiohttp@3.11.16-1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 6 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 7 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 8 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 9 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 10 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 11 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 12 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 13 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 14 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 15 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 16 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 17 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.11.16-1 |
|
|
| aliases |
CVE-2024-23829, GHSA-8qpw-xqxj-h4r2, PYSEC-2024-26
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-jxqg-x9dh-z3hb |
|
| 10 |
| url |
VCID-k122-7d38-2ug5 |
| vulnerability_id |
VCID-k122-7d38-2ug5 |
| summary |
AIOHTTP is vulnerable to HTTP Request/Response Smuggling through incorrect parsing of chunked trailer sections
### Summary
The Python parser is vulnerable to a request smuggling vulnerability due to not parsing trailer sections of an HTTP request.
### Impact
If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections.
----
Patch: https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-53643 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23245 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23152 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23289 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00078 |
| scoring_system |
epss |
| scoring_elements |
0.23078 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24852 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24858 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24847 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24901 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.2494 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24925 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24716 |
| published_at |
2026-04-29T12:55:00Z |
|
| 11 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24762 |
| published_at |
2026-04-26T12:55:00Z |
|
| 12 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24773 |
| published_at |
2026-04-24T12:55:00Z |
|
| 13 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.2483 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-53643 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-53643, GHSA-9548-qrrj-x5pj
|
| risk_score |
1.6 |
| exploitability |
0.5 |
| weighted_severity |
3.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k122-7d38-2ug5 |
|
| 11 |
| url |
VCID-kf4p-q9n9-ayhn |
| vulnerability_id |
VCID-kf4p-q9n9-ayhn |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-22815 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00038 |
| scoring_system |
epss |
| scoring_elements |
0.11462 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.0004 |
| scoring_system |
epss |
| scoring_elements |
0.122 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16263 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16369 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16335 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16315 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16346 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16218 |
| published_at |
2026-04-29T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16259 |
| published_at |
2026-04-26T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16475 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16491 |
| published_at |
2026-04-09T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16432 |
| published_at |
2026-04-08T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16375 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16436 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-22815 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-22815, GHSA-w2fm-2cpv-w7v5
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kf4p-q9n9-ayhn |
|
| 12 |
| url |
VCID-peyu-fxyx-ayde |
| vulnerability_id |
VCID-peyu-fxyx-ayde |
| summary |
AIOHTTP vulnerable to DoS through chunked messages
### Summary
Handling of chunked messages can result in excessive blocking CPU usage when receiving a large number of chunks.
### Impact
If an application makes use of the `request.read()` method in an endpoint, it may be possible for an attacker to cause the server to spend a moderate amount of blocking CPU time (e.g. 1 second) while processing the request. This could potentially lead to DoS as the server would be unable to handle other requests during that time.
-----
Patch: https://github.com/aio-libs/aiohttp/commit/dc3170b56904bdf814228fae70a5501a42a6c712
Patch: https://github.com/aio-libs/aiohttp/commit/4ed97a4e46eaf61bd0f05063245f613469700229 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69229 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16113 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16152 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16154 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16261 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16223 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16204 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16268 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16336 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16392 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16328 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16454 |
| published_at |
2026-04-04T12:55:00Z |
|
| 12 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16375 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00052 |
| scoring_system |
epss |
| scoring_elements |
0.16391 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69229 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69229, GHSA-g84x-mcqj-x9qq
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-peyu-fxyx-ayde |
|
| 13 |
| url |
VCID-qrus-4szm-c3bj |
| vulnerability_id |
VCID-qrus-4szm-c3bj |
| summary |
AIOHTTP's unicode processing of header values could cause parsing discrepancies
### Summary
The Python HTTP parser may allow a request smuggling attack with the presence of non-ASCII characters.
### Impact
If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections.
------
Patch: https://github.com/aio-libs/aiohttp/commit/32677f2adfd907420c078dda6b79225c6f4ebce0 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69224 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13124 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13228 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13256 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13251 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13164 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13165 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13259 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13308 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13243 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13325 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13447 |
| published_at |
2026-04-04T12:55:00Z |
|
| 11 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13383 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13346 |
| published_at |
2026-04-11T12:55:00Z |
|
| 13 |
| value |
0.00043 |
| scoring_system |
epss |
| scoring_elements |
0.13376 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69224 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69224, GHSA-69f9-5gxw-wvc2
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qrus-4szm-c3bj |
|
| 14 |
| url |
VCID-qt9z-6kwe-wbht |
| vulnerability_id |
VCID-qt9z-6kwe-wbht |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34514 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1165 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11693 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11694 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11732 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.11778 |
| published_at |
2026-04-24T12:55:00Z |
|
| 5 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1181 |
| published_at |
2026-04-21T12:55:00Z |
|
| 6 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13732 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13791 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18323 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18287 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18375 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18423 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.1837 |
| published_at |
2026-04-08T12:55:00Z |
|
| 13 |
| value |
0.00059 |
| scoring_system |
epss |
| scoring_elements |
0.18422 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34514 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34514, GHSA-2vrm-gr82-f7m5
|
| risk_score |
2.4 |
| exploitability |
0.5 |
| weighted_severity |
4.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qt9z-6kwe-wbht |
|
| 15 |
| url |
VCID-sjws-ddnq-fke2 |
| vulnerability_id |
VCID-sjws-ddnq-fke2 |
| summary |
AIOHTTP's HTTP Parser auto_decompress feature is vulnerable to zip bomb
### Summary
A zip bomb can be used to execute a DoS against the aiohttp server.
### Impact
An attacker may be able to send a compressed request that when decompressed by aiohttp could exhaust the host's memory.
------
Patch: https://github.com/aio-libs/aiohttp/commit/2b920c39002cee0ec5b402581779bbaaf7c9138a |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69223 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1943 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19467 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19479 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19584 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19572 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19565 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19637 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19835 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19689 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19587 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19782 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19646 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19695 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69223 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69223, GHSA-6mq8-rvhq-8wgg
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-sjws-ddnq-fke2 |
|
| 16 |
| url |
VCID-t9gx-etxx-vkgb |
| vulnerability_id |
VCID-t9gx-etxx-vkgb |
| summary |
AIOHTTP vulnerable to DoS when bypassing asserts
### Summary
When assert statements are bypassed, an infinite loop can occur, resulting in a DoS attack when processing a POST body.
### Impact
If optimisations are enabled (`-O` or `PYTHONOPTIMIZE=1`), and the application includes a handler that uses the `Request.post()` method, then an attacker may be able to execute a DoS attack with a specially crafted message.
------
Patch: https://github.com/aio-libs/aiohttp/commit/bc1319ec3cbff9438a758951a30907b072561259 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69227 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1943 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19467 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19479 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19584 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19572 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19565 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19637 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19835 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19557 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19689 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19587 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19782 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19646 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19695 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69227 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69227, GHSA-jj3x-wxrx-4x23
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-t9gx-etxx-vkgb |
|
| 17 |
| url |
VCID-tmjw-8cdt-7yf7 |
| vulnerability_id |
VCID-tmjw-8cdt-7yf7 |
| summary |
|
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34520 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00042 |
| scoring_system |
epss |
| scoring_elements |
0.13027 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00045 |
| scoring_system |
epss |
| scoring_elements |
0.13732 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17325 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17329 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17387 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17441 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17488 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17476 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00055 |
| scoring_system |
epss |
| scoring_elements |
0.17416 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17799 |
| published_at |
2026-04-29T12:55:00Z |
|
| 10 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17948 |
| published_at |
2026-04-21T12:55:00Z |
|
| 11 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17912 |
| published_at |
2026-04-18T12:55:00Z |
|
| 12 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17836 |
| published_at |
2026-04-26T12:55:00Z |
|
| 13 |
| value |
0.00057 |
| scoring_system |
epss |
| scoring_elements |
0.17858 |
| published_at |
2026-04-24T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2026-34520 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
|
| 1 |
| value |
2.7 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U |
|
| 2 |
| value |
LOW |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
|
| aliases |
CVE-2026-34520, GHSA-63hf-3vf5-4wqf
|
| risk_score |
4.1 |
| exploitability |
0.5 |
| weighted_severity |
8.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tmjw-8cdt-7yf7 |
|
| 18 |
| url |
VCID-tn28-662n-vug8 |
| vulnerability_id |
VCID-tn28-662n-vug8 |
| summary |
aiohttp Cross-site Scripting vulnerability on index pages for static file handling
### Summary
A XSS vulnerability exists on index pages for static file handling.
### Details
When using `web.static(..., show_index=True)`, the resulting index pages do not escape file names.
If users can upload files with arbitrary filenames to the static directory, the server is vulnerable to XSS attacks.
### Workaround
We have always recommended using a reverse proxy server (e.g. nginx) for serving static files. Users following the recommendation are unaffected.
Other users can disable `show_index` if unable to upgrade.
-----
Patch: https://github.com/aio-libs/aiohttp/pull/8319/files |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-27306 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.69288 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00593 |
| scoring_system |
epss |
| scoring_elements |
0.6934 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00709 |
| scoring_system |
epss |
| scoring_elements |
0.72284 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
0.00709 |
| scoring_system |
epss |
| scoring_elements |
0.72288 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73066 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73167 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73158 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73117 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73103 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73092 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73072 |
| published_at |
2026-04-02T12:55:00Z |
|
| 11 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73115 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73121 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00749 |
| scoring_system |
epss |
| scoring_elements |
0.73141 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-27306 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/python-aiohttp@3.11.16-1 |
| purl |
pkg:deb/debian/python-aiohttp@3.11.16-1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 6 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 7 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 8 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 9 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 10 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 11 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 12 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 13 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 14 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 15 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 16 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 17 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.11.16-1 |
|
|
| aliases |
CVE-2024-27306, GHSA-7gpw-8wmc-pm8g
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tn28-662n-vug8 |
|
| 19 |
| url |
VCID-ttq3-65ny-skdg |
| vulnerability_id |
VCID-ttq3-65ny-skdg |
| summary |
aiohttp.web.Application vulnerable to HTTP request smuggling via llhttp HTTP request parser
### Impact
aiohttp v3.8.4 and earlier are [bundled with llhttp v6.0.6](https://github.com/aio-libs/aiohttp/blob/v3.8.4/.gitmodules) which is vulnerable to CVE-2023-30589. The vulnerable code is used by aiohttp for its HTTP request parser when available which is the default case when installing from a wheel.
This vulnerability only affects users of aiohttp as an HTTP server (ie `aiohttp.Application`), you are not affected by this vulnerability if you are using aiohttp as an HTTP client library (ie `aiohttp.ClientSession`).
### Reproducer
```python
from aiohttp import web
async def example(request: web.Request):
headers = dict(request.headers)
body = await request.content.read()
return web.Response(text=f"headers: {headers} body: {body}")
app = web.Application()
app.add_routes([web.post('/', example)])
web.run_app(app)
```
Sending a crafted HTTP request will cause the server to misinterpret one of the HTTP header values leading to HTTP request smuggling.
```console
$ printf "POST / HTTP/1.1\r\nHost: localhost:8080\r\nX-Abc: \rxTransfer-Encoding: chunked\r\n\r\n1\r\nA\r\n0\r\n\r\n" \
| nc localhost 8080
Expected output:
headers: {'Host': 'localhost:8080', 'X-Abc': '\rxTransfer-Encoding: chunked'} body: b''
Actual output (note that 'Transfer-Encoding: chunked' is an HTTP header now and body is treated differently)
headers: {'Host': 'localhost:8080', 'X-Abc': '', 'Transfer-Encoding': 'chunked'} body: b'A'
```
### Patches
Upgrade to the latest version of aiohttp to resolve this vulnerability. It has been fixed in v3.8.5: [`pip install aiohttp >= 3.8.5`](https://pypi.org/project/aiohttp/3.8.5/)
### Workarounds
If you aren't able to upgrade you can reinstall aiohttp using `AIOHTTP_NO_EXTENSIONS=1` as an environment variable to disable the llhttp HTTP request parser implementation. The pure Python implementation isn't vulnerable to request smuggling:
```console
$ python -m pip uninstall --yes aiohttp
$ AIOHTTP_NO_EXTENSIONS=1 python -m pip install --no-binary=aiohttp --no-cache aiohttp
```
### References
* https://nvd.nist.gov/vuln/detail/CVE-2023-30589
* https://hackerone.com/reports/2001873 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-37276 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05775 |
| scoring_system |
epss |
| scoring_elements |
0.9048 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.05775 |
| scoring_system |
epss |
| scoring_elements |
0.90506 |
| published_at |
2026-04-29T12:55:00Z |
|
| 2 |
| value |
0.05775 |
| scoring_system |
epss |
| scoring_elements |
0.90509 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.05775 |
| scoring_system |
epss |
| scoring_elements |
0.90497 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.05775 |
| scoring_system |
epss |
| scoring_elements |
0.90498 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.05775 |
| scoring_system |
epss |
| scoring_elements |
0.90481 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.05775 |
| scoring_system |
epss |
| scoring_elements |
0.90487 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.05775 |
| scoring_system |
epss |
| scoring_elements |
0.90474 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.05775 |
| scoring_system |
epss |
| scoring_elements |
0.90462 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.05775 |
| scoring_system |
epss |
| scoring_elements |
0.90456 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.05775 |
| scoring_system |
epss |
| scoring_elements |
0.90444 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-37276 |
|
| 2 |
|
| 3 |
| reference_url |
https://github.com/aio-libs/aiohttp |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/aio-libs/aiohttp |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://hackerone.com/reports/2001873 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
|
| 1 |
| value |
6.9 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N |
|
| 2 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-18T16:05:51Z/ |
|
|
| url |
https://hackerone.com/reports/2001873 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/python-aiohttp@3.11.16-1 |
| purl |
pkg:deb/debian/python-aiohttp@3.11.16-1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-19q4-vzzb-8uca |
|
| 1 |
| vulnerability |
VCID-5f1f-mrwv-zucz |
|
| 2 |
| vulnerability |
VCID-cg9h-fysf-xygf |
|
| 3 |
| vulnerability |
VCID-d3pa-kwgz-vuag |
|
| 4 |
| vulnerability |
VCID-drqp-x9gc-2qd3 |
|
| 5 |
| vulnerability |
VCID-ft9z-nd6x-27dz |
|
| 6 |
| vulnerability |
VCID-g4rj-1kzy-pkft |
|
| 7 |
| vulnerability |
VCID-hyh4-58xy-xfge |
|
| 8 |
| vulnerability |
VCID-k122-7d38-2ug5 |
|
| 9 |
| vulnerability |
VCID-kf4p-q9n9-ayhn |
|
| 10 |
| vulnerability |
VCID-peyu-fxyx-ayde |
|
| 11 |
| vulnerability |
VCID-qrus-4szm-c3bj |
|
| 12 |
| vulnerability |
VCID-qt9z-6kwe-wbht |
|
| 13 |
| vulnerability |
VCID-sjws-ddnq-fke2 |
|
| 14 |
| vulnerability |
VCID-t9gx-etxx-vkgb |
|
| 15 |
| vulnerability |
VCID-tmjw-8cdt-7yf7 |
|
| 16 |
| vulnerability |
VCID-vqvz-jfqh-jkaz |
|
| 17 |
| vulnerability |
VCID-zm3a-mf2z-xfcm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/python-aiohttp@3.11.16-1 |
|
|
| aliases |
CVE-2023-37276, GHSA-45c4-8wx5-qw6w, PYSEC-2023-120
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ttq3-65ny-skdg |
|
| 20 |
| url |
VCID-vqvz-jfqh-jkaz |
| vulnerability_id |
VCID-vqvz-jfqh-jkaz |
| summary |
AIOHTTP vulnerable to brute-force leak of internal static file path components
### Summary
Path normalization for static files prevents path traversal, but opens up the ability for an attacker to ascertain the
existence of absolute path components.
### Impact
If an application uses `web.static()` (not recommended for production deployments), it may be possible for an attacker to ascertain the existence of path components.
------
Patch: https://github.com/aio-libs/aiohttp/commit/f2a86fd5ac0383000d1715afddfa704413f0711e |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69226 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19575 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19611 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19625 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1973 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19718 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19716 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19982 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.1984 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19788 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19708 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19741 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19927 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19798 |
| published_at |
2026-04-12T12:55:00Z |
|
| 13 |
| value |
0.00063 |
| scoring_system |
epss |
| scoring_elements |
0.19843 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69226 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69226, GHSA-54jq-c3m8-4m76
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vqvz-jfqh-jkaz |
|
| 21 |
| url |
VCID-zm3a-mf2z-xfcm |
| vulnerability_id |
VCID-zm3a-mf2z-xfcm |
| summary |
AIOHTTP Vulnerable to Cookie Parser Warning Storm
### Summary
Reading multiple invalid cookies can lead to a logging storm.
### Impact
If the ``cookies`` attribute is accessed in an application, then an attacker may be able to trigger a storm of warning-level logs using a specially crafted Cookie header.
----
Patch: https://github.com/aio-libs/aiohttp/commit/64629a0834f94e46d9881f4e99c41a137e1f3326 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69230 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02675 |
| published_at |
2026-04-29T12:55:00Z |
|
| 1 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02618 |
| published_at |
2026-04-26T12:55:00Z |
|
| 2 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02629 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02641 |
| published_at |
2026-04-21T12:55:00Z |
|
| 4 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02533 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02528 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02546 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02572 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02543 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02551 |
| published_at |
2026-04-08T12:55:00Z |
|
| 10 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02541 |
| published_at |
2026-04-13T12:55:00Z |
|
| 11 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02529 |
| published_at |
2026-04-02T12:55:00Z |
|
| 12 |
| value |
0.00014 |
| scoring_system |
epss |
| scoring_elements |
0.02554 |
| published_at |
2026-04-11T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-69230 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-69230, GHSA-fh55-r93g-j68g
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
4.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zm3a-mf2z-xfcm |
|