AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below enable an attacker to ascertain the existence of absolute path components through the path normalization logic for static files meant to prevent path traversal. If an application uses web.static() (not recommended for production deployments), it may be possible for an attacker to ascertain the existence of path components. This issue is fixed in version 3.13.3.
Metrics
Affected Vendors & Products
References
History
Tue, 06 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 Jan 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aio-libs
Aio-libs aiohttp Session Aio-libs Project Aio-libs Project aiohttp Aiohttp Aiohttp aio-libs Aiohttp aiohttp |
|
| Vendors & Products |
Aio-libs
Aio-libs aiohttp Session Aio-libs Project Aio-libs Project aiohttp Aiohttp Aiohttp aio-libs Aiohttp aiohttp |
Tue, 06 Jan 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 05 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below enable an attacker to ascertain the existence of absolute path components through the path normalization logic for static files meant to prevent path traversal. If an application uses web.static() (not recommended for production deployments), it may be possible for an attacker to ascertain the existence of path components. This issue is fixed in version 3.13.3. | |
| Title | AIOHTTP allows for a brute-force leak of internal static filepath components | |
| Weaknesses | CWE-200 CWE-22 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-01-05T22:52:38.467Z
Updated: 2026-01-06T19:03:21.505Z
Reserved: 2025-12-29T20:53:09.411Z
Link: CVE-2025-69226
Updated: 2026-01-06T14:25:38.458Z
Status : Received
Published: 2026-01-05T23:15:40.913
Modified: 2026-01-05T23:15:40.913
Link: CVE-2025-69226