CVE-2025-69224

Publication date 5 January 2026

Last updated 16 February 2026


Ubuntu priority

Description

AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below of the Python HTTP parser may allow a request smuggling attack with the presence of non-ASCII characters. If a pure Python version of AIOHTTP is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. This issue is fixed in version 3.13.3.

Status

Package Ubuntu Release Status
python-aiohttp 26.04 LTS resolute
Not affected
25.10 questing
Fixed 3.11.16-1ubuntu0.1
25.04 plucky Ignored end of life, was needs-triage
24.04 LTS noble
Fixed 3.9.1-1ubuntu0.1+esm2
22.04 LTS jammy
Fixed 3.8.1-4ubuntu0.2+esm2
20.04 LTS focal Ignored backporting risks regression
18.04 LTS bionic Ignored backporting risks regression
16.04 LTS xenial Ignored end of ESM support, was ignored [backporting risks regression]

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro 30-day free trial

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
python-aiohttp

Access our resources on patching vulnerabilities