aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation made it possible for an attacker to modify the HTTP request (e.g. to insert a new header) or create a new HTTP request if the attacker controls the HTTP version. The vulnerability only occurs if the attacker can control the HTTP version of the request. This issue has been patched in version 3.9.0.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4041-1 | python-aiohttp security update |
Debian DSA |
DSA-5828-1 | python-aiohttp security update |
EUVD |
EUVD-2023-0006 | aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Improper validation made it possible for an attacker to modify the HTTP request (e.g. to insert a new header) or create a new HTTP request if the attacker controls the HTTP version. The vulnerability only occurs if the attacker can control the HTTP version of the request. This issue has been patched in version 3.9.0. |
Github GHSA |
GHSA-q3qx-c6g2-7pw2 | aiohttp's ClientSession is vulnerable to CRLF injection via version |
Ubuntu USN |
USN-7642-1 | AIOHTTP vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 03 Nov 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-11-04T18:19:34.328Z
Reserved: 2023-11-21T18:57:30.428Z
Link: CVE-2023-49081
No data.
Status : Modified
Published: 2023-11-30T07:15:08.723
Modified: 2025-11-04T19:16:08.550
Link: CVE-2023-49081
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN