CVE-2025-69226

NameCVE-2025-69226
DescriptionAIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below enable an attacker to ascertain the existence of absolute path components through the path normalization logic for static files meant to prevent path traversal. If an application uses web.static() (not recommended for production deployments), it may be possible for an attacker to ascertain the existence of path components. This issue is fixed in version 3.13.3.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-aiohttp (PTS)bullseye3.7.4-1vulnerable
bullseye (security)3.7.4-1+deb11u1vulnerable
bookworm, bookworm (security)3.8.4-1+deb12u1vulnerable
trixie3.11.16-1vulnerable
forky3.13.1-1vulnerable
sid3.13.3-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-aiohttpsource(unstable)3.13.3-1

Notes

https://github.com/aio-libs/aiohttp/security/advisories/GHSA-54jq-c3m8-4m76
Fixed by: https://github.com/aio-libs/aiohttp/commit/f2a86fd5ac0383000d1715afddfa704413f0711e (v3.13.3)

Search for package or bug name: Reporting problems