Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-6141-1 | python-aiohttp security update |
Github GHSA |
GHSA-jj3x-wxrx-4x23 | AIOHTTP vulnerable to DoS when bypassing asserts |
Wed, 14 Jan 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 06 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 Jan 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aio-libs
Aio-libs aiohttp Session Aio-libs Project Aio-libs Project aiohttp Aiohttp Aiohttp aio-libs Aiohttp aiohttp |
|
| Vendors & Products |
Aio-libs
Aio-libs aiohttp Session Aio-libs Project Aio-libs Project aiohttp Aiohttp Aiohttp aio-libs Aiohttp aiohttp |
Tue, 06 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 05 Jan 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below allow for an infinite loop to occur when assert statements are bypassed, resulting in a DoS attack when processing a POST body. If optimizations are enabled (-O or PYTHONOPTIMIZE=1), and the application includes a handler that uses the Request.post() method, then an attacker may be able to execute a DoS attack with a specially crafted message. This issue is fixed in version 3.13.3. | |
| Title | AIOHTTP vulnerable to DoS when bypassing asserts | |
| Weaknesses | CWE-835 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-01-06T19:02:48.192Z
Reserved: 2025-12-29T20:53:19.433Z
Link: CVE-2025-69227
Updated: 2026-01-06T14:25:14.937Z
Status : Analyzed
Published: 2026-01-06T00:15:48.053
Modified: 2026-01-14T19:16:56.100
Link: CVE-2025-69227
OpenCVE Enrichment
Updated: 2026-01-06T14:16:21Z
Debian DSA
Github GHSA