Jan 6, 2026·6 min read·16 visits
aiohttp versions <= 3.13.2 failed to cap the output size of decompressed request bodies. By sending a small, highly compressed payload (gzip, deflate, brotli), an attacker can force the server to allocate gigabytes of memory, triggering an OOM crash and Denial of Service.
A classic 'Zip Bomb' vulnerability in the popular Python aiohttp framework allowing unauthenticated attackers to exhaust server memory via highly compressed payloads.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H| Product | Affected Versions | Fixed Version |
|---|---|---|
aiohttp aio-libs | <= 3.13.2 | 3.13.3 |
| Attribute | Detail |
|---|---|
| CWE | CWE-409 (Improper Handling of Highly Compressed Data) |
| CVSS | 7.5 (High) |
| Attack Vector | Network |
| Exploit Status | PoC Available |
| Impact | Denial of Service (DoS) |
| Patch | v3.13.3 |
The software does not handle compressed data correctly, allowing an attacker to cause a denial of service by sending a small amount of data that decompresses to a very large amount.