aiohttp

Asynchronous HTTP client/server framework for asyncio and Python

Version: 3.11.13 registry icon
Safety score
-60
Check your open source dependency risks. Get immediate insight about security, stability and licensing risks.
Security Risks of Known Vulnerabilities
CVE-2026-34517
CWE-770
Threat level: LOW | CVSS score: 2

For some multipart form fields, aiohttp read the entire field into memory before checking client_max_size.



CVE-2026-34514
CWE-113
Threat level: LOW | CVSS score: 2

An attacker who controls the content_type parameter in aiohttp could use this to inject extra headers or similar exploits.



CVE-2026-34513
CWE-770
Threat level: LOW | CVSS score: 2

An unbounded DNS cache could result in excessive memory usage possibly resulting in a DoS situation.



CVE-2026-34525
CWE-20
Threat level: MEDIUM | CVSS score: 5

Multiple Host headers were allowed in aiohttp.



CVE-2026-34515
CWE-36
Threat level: MEDIUM | CVSS score: 5

AIOHTTP affected by UNC SSRF/NTLMv2 Credential Theft/Local File Read in static resource handler on Windows



CVE-2026-34520
CWE-113
Threat level: LOW | CVSS score: 2

AIOHTTP's C parser (llhttp) accepts null bytes and control characters in response header values - header injection/security bypass



CVE-2026-22815
CWE-400
Threat level: MEDIUM | CVSS score: 5

Insufficient restrictions in header/trailer handling could cause uncapped memory usage.



CVE-2026-34518
CWE-200
Threat level: LOW | CVSS score: 2

When following redirects to a different origin, aiohttp drops the Authorization header, but retains the Cookie and Proxy-Authorization headers.



CVE-2026-34516
CWE-770
Threat level: MEDIUM | CVSS score: 5

A response with an excessive number of multipart headers may be allowed to use more memory than intended, potentially allowing a DoS vulnerability.



CVE-2026-34519
CWE-113
Threat level: LOW | CVSS score: 2

An attacker who controls the reason parameter when creating a Response may be able to inject extra headers or similar exploits.



Please note that this component is affected by 9 other vulnerabilities
0 Critical  |  0 High  |  9 Medium  |  0 Low  |  0 Suggest

Latest safe minor: 3.13.5 - Latest safe major: 4.0.0a1 Scan your application codebase with Meterian to see all known vulnerabilities in your open source software dependencies.


Stability

Stay updated with the latest patches and releases. Plan your sofware desisgn. Avoid common known vulnerabilities fixed by the open source community

Latest patch release:   3.11.18

Latest minor release:   3.13.5

Latest major release:   4.0.0a1

Licensing

Maintain your licence declarations and avoid unwanted licences to protect your IP the way you intended.

Apache-1.0   -   Apache License 1.0

Not a wildcard

Not proprietary

OSI Compliant