{"id":"AZL-73497","summary":"CVE-2025-69224 affecting package python-aiohttp 3.6.2-3","details":"AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below of the Python HTTP parser may allow a request smuggling attack with the presence of non-ASCII characters. If a pure Python version of AIOHTTP is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. This issue is fixed in version 3.13.3.","modified":"2026-04-01T05:22:38.245324Z","published":"2026-01-05T23:15:40Z","upstream":["CVE-2025-69224"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-69224"}],"affected":[{"package":{"name":"python-aiohttp","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/python-aiohttp"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"3.6.2-3"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-73497.json"}}],"schema_version":"1.7.5"}