CVE-2023-49081
Python vulnerability analysis and mitigation

Overview

CVE-2023-49081 affects aiohttp, an asynchronous HTTP client/server framework for asyncio and Python. The vulnerability was discovered and disclosed on November 30, 2023. The issue allows an attacker to modify HTTP requests or create new requests by exploiting improper validation of HTTP version parameters. This vulnerability affects versions prior to 3.9.0 (GitHub Advisory).

Technical details

The vulnerability stems from improper validation of HTTP version parameters in the ClientSession component. The issue occurs specifically when an attacker can control the HTTP version of the request and the Connection header is passed to the headers parameter. When a list is passed as the version parameter, it bypasses validation, enabling CRLF injection. The vulnerability has been assigned a CVSS v3.1 base score of 7.2 (HIGH) by GitHub and 5.3 (MEDIUM) by NVD (NVD).

Impact

When successfully exploited, this vulnerability can lead to HTTP request smuggling, allowing attackers to modify existing HTTP requests (such as inserting new headers) or create entirely new HTTP requests. This could potentially lead to security implications in applications relying on aiohttp for HTTP communications (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in aiohttp version 3.9.0. For users unable to upgrade immediately, a workaround is available: validate user input to the version parameter to ensure it is a string type. The fix involves disallowing arbitrary sequence types in the version parameter (GitHub Fix).

Additional resources


SourceThis report was generated using AI

Related Python vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66471HIGH8.9
  • PythonPython
  • py3-urllib3
NoYesDec 05, 2025
CVE-2025-66418HIGH8.9
  • PythonPython
  • python-urllib3
NoYesDec 05, 2025
CVE-2025-65958HIGH8.5
  • PythonPython
  • cpe:2.3:a:openwebui:open_webui
NoYesDec 04, 2025
CVE-2025-56427HIGH7.5
  • PythonPython
  • composio
NoNoDec 04, 2025
CVE-2025-63681MEDIUM4.3
  • PythonPython
  • open-webui
NoNoDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management