Multiple vulnerabilities have been discovered in AIOHTTP, potentially leading to header injection, denial-of-service (DoS), and memory exhaustion. These issues affect applications using AIOHTTP version 3.9.5 and earlier. A patch is available in version 3.13.4.
These vulnerabilities range in severity, with the header injection issue having a CVSS score of 2.5.
What is Aiohttp?
CVE-2026-34520: AIOHTTP Header Injection Vulnerability
Low severity due to limited impact and exploitability.
EPSS score of 0.045 indicates a low probability of exploitation.
AIOHTTP's C parser (llhttp) accepted null bytes and control characters in response header values. An attacker could send crafted header values that are interpreted differently than expected, potentially leading to security bypasses.
How to fix CVE-2026-34520 in Aiohttp
Patch within 7 days- 1.Upgrade AIOHTTP to version 3.13.4 or later.
pip install --upgrade aiohttpVerify with:
pip show aiohttpWorkaround: Implement input validation and sanitization on header values at the application level.
NextGuard automatically flags CVE-2026-34520 if Aiohttp appears in any of your monitored projects — no manual lookup required.
CVE-2026-34516: AIOHTTP Multipart Header Size Bypass
Severity not specified.
EPSS score of 0.04 indicates a low probability of exploitation.
AIOHTTP allowed an excessive number of multipart headers, potentially leading to a denial-of-service (DoS) vulnerability. Multipart headers were not subject to the same size restrictions as normal headers.
How to fix CVE-2026-34516 in Aiohttp
Patch within 7 days- 1.Upgrade AIOHTTP to version 3.13.4 or later.
pip install --upgrade aiohttpVerify with:
pip show aiohttpWorkaround: Limit the number of multipart headers accepted by the application.
NextGuard automatically flags CVE-2026-34516 if Aiohttp appears in any of your monitored projects — no manual lookup required.
CVE-2026-22815: AIOHTTP Uncapped Memory Usage via Trailer Headers
Severity not specified.
EPSS score of 0.04 indicates a low probability of exploitation.
AIOHTTP allowed unlimited trailer headers, potentially leading to uncapped memory usage and a denial-of-service (DoS). Insufficient restrictions in header/trailer handling could cause memory exhaustion.
How to fix CVE-2026-22815 in Aiohttp
Patch within 7 days- 1.Upgrade AIOHTTP to version 3.13.4 or later.
pip install --upgrade aiohttpVerify with:
pip show aiohttpWorkaround: Implement limits on the number and size of trailer headers accepted by the application.
NextGuard automatically flags CVE-2026-22815 if Aiohttp appears in any of your monitored projects — no manual lookup required.
Stay ahead of Python vulnerabilities
Proactively detect and remediate vulnerabilities in your Python projects. Use NextGuard to monitor your python dependencies.
Compare PlansFrequently asked questions
Multiple vulnerabilities in AIOHTTP have been addressed in version 3.13.4. It is crucial to upgrade to the latest version to protect your applications. See all python vulnerabilities.
Related topics