CVE-2026-34520 — HTTP Request/Response Splitting in Aiohttp
Severity
2.7LOWNVD
EPSS
0.1%
top 82.67%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 1
Description
AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.13.4, the C parser (the default for most installs) accepted null bytes and control characters in response headers. This issue has been patched in version 3.13.4.
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
Affected Packages2 packages
🔴Vulnerability Details
4OSV▶
CVE-2026-34520: AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python↗2026-04-01
OSV▶
AIOHTTP's C parser (llhttp) accepts null bytes and control characters in response header values - header injection/security bypass↗2026-04-01
GHSA▶
AIOHTTP's C parser (llhttp) accepts null bytes and control characters in response header values - header injection/security bypass↗2026-04-01
CVEList▶
AIOHTTP: C parser (llhttp) accepts null bytes and control characters in response header values - header injection / security bypass↗2026-04-01