Impact
An asynchronous HTTP client/server framework for Python, called AIOHTTP, had insufficient limits on trailer headers. The flaw permits a client to send an unlimited number of trailer headers, so unbounded memory allocations can occur. This results in memory exhaustion that can lead to crashes or denial of service for legitimate traffic. The weakness maps to CWE‑400 and CWE‑770.
Affected Systems
The vulnerability affects the aio-libs aiohttp package in all releases prior to version 3.13.4. Versions up to and including 3.13.3 are impacted. Upgrading to 3.13.4 or later resolves the issue.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity, and the EPSS score of less than 1% suggests low current exploit activity. The vulnerability is not listed in CISA's KEV catalog. Based on the description, it is inferred that an attacker can trigger the flaw by sending crafted HTTP requests containing an excessively large number of trailer headers from a remote host. If exploited, memory consumption can grow without bound, potentially exhausting system resources and causing service interruption.
OpenCVE Enrichment
Github GHSA