When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 22 Dec 2025 20:15:00 +0000


Fri, 05 Dec 2025 16:30:00 +0000


Wed, 03 Dec 2025 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-770
References
Metrics threat_severity

None

cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H'}

threat_severity

Moderate


Tue, 02 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-400

Tue, 02 Dec 2025 17:45:00 +0000


Tue, 02 Dec 2025 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Python
Python cpython
Vendors & Products Python
Python cpython

Mon, 01 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 01 Dec 2025 18:15:00 +0000

Type Values Removed Values Added
Description When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
Title Excessive read buffering DoS in http.client
References
Metrics cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: PSF

Published:

Updated: 2025-12-22T20:03:45.491Z

Reserved: 2025-12-01T17:54:40.759Z

Link: CVE-2025-13836

cve-icon Vulnrichment

Updated: 2025-12-01T18:32:42.784Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-01T18:16:04.200

Modified: 2025-12-22T20:15:44.253

Link: CVE-2025-13836

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-12-01T18:02:38Z

Links: CVE-2025-13836 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-12-02T11:58:49Z

Weaknesses