The maintainers of aiohttp, a widely used asynchronous HTTP client/server framework for Python, have released a critical security update (version 3.13.3) to address seven distinct vulnerabilities affecting earlier versions up to 3.13.2. These flaws span multiple severity levels, including two High-severity vulnerabilities that can lead to Denial of Service (DoS) attacks, alongside Moderate and Low-severity issues related to request handling, logging abuse, parsing inconsistencies, and information disclosure. The most serious issues could allow attackers to exhaust server memory or force the application into infinite loops, effectively freezing services and disrupting availability. Additional vulnerabilities enable attackers to degrade performance, flood logs, bypass security controls via request smuggling, or infer sensitive filesystem paths when static file handling is enabled. The vulnerabilities stem primarily from weaknesses in request parsing, input validation, and assumptions made during runtime execution. One critical flaw arises from improper handling of POST request data, allowing uncontrolled memory allocation when Request.post() is used. Another high-risk issue is triggered when Python is run in optimized mode, where assert statements are removed, exposing a logic flaw that can cause infinite loops. Other issues involve inefficient handling of chunked transfer encoding, improper validation of cookies leading to excessive logging, and inconsistent parsing of non-ASCII characters that may enable request smuggling. Collectively, these flaws expose aiohttp-based applications to resource exhaustion, performance degradation, and potential security bypasses. Developers and organizations using aiohttp are strongly advised to upgrade immediately to version 3.13.3, which fully patches all identified vulnerabilities. Applications should be reviewed to ensure safe handling of POST data, careful use of optimized Python modes, and proper configuration of static file serving. Logging mechanisms should be monitored to prevent abuse, and defensive limits should be enforced on request sizes and chunk counts. Regular dependency updates, security testing, and adherence to secure coding practices will help reduce the risk of similar vulnerabilities in the future and ensure the continued resilience of aiohttp-based services.
Security researchers have disclosed a critical command injection vulnerability (CVE-2026-0625) affecting multiple legacy D-Link DSL gateway routers that have reached end-of-life an...
Microsoft has issued a security warning highlighting how misconfigured email routing and spoof protection gaps are being actively exploited by threat actors to send phishing emails...
n8n, a widely used workflow automation platform, has released an urgent security advisory following the discovery of a critical vulnerability that could lead to complete system com...