Impact
AIOHTTP allows an attacker to send a response with an excessive number of multipart headers. Because the framework does not enforce a limit, it allocates memory proportional to the header count, leading to possible memory exhaustion and a denial‑of‑service condition. The defect is a memory allocation flaw as identified by CWE‑770.
Affected Systems
The vulnerability affects all releases of aio-libs aiohttp older than version 3.13.4. The fix was introduced in v3.13.4, which validates multipart header counts before processing.
Risk and Exploitability
The CVSS score of 6.6 indicates moderate severity, and no EPSS score is available. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is inferred from the description: an attacker would send a crafted HTTP response containing thousands of multipart headers to a server running an affected aiohttp instance, which is feasible over the network and does not require local code execution.
OpenCVE Enrichment
Github GHSA