CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Dashboard
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2025-69225
2.7

The Polyglot Parser: Smuggling Requests with Devanagari Digits

Alon Barad
Alon Barad
Software Engineer

Jan 6, 2026·5 min read·4 visits

PoC Available

Executive Summary (TL;DR)

Python's `re` module is Unicode-aware by default, meaning `\d` matches more than just `0-9`. Aiohttp failed to restrict its `Range` header parser to ASCII, allowing attackers to use characters like Devanagari digits to sneak payloads past strict upstream proxies while the backend treats them as valid numbers. Fixed in version 3.13.3.

A regex flaw in aiohttp allows Unicode digits to bypass HTTP validation, enabling potential request smuggling and cache poisoning via parser differentials.

Official Patches

GitHubOfficial patch commit

Fix Analysis (1)

Technical Appendix

CVSS Score
2.7/ 10
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U

Affected Systems

Python applications using aiohttp <= 3.13.2Microservices using aiohttp for backend API handling

Affected Versions Detail

Product
Affected Versions
Fixed Version
aiohttp
aio-libs
<= 3.13.23.13.3
AttributeDetail
CWE IDCWE-444
Attack VectorNetwork
CVSS v4.02.7 (Low)
ImpactLow (Integrity)
Exploit StatusPoC Available
PatternRegex Mismatch / Parser Differential

MITRE ATT&CK Mapping

T1190Exploit Public-Facing Application
Initial Access
T1036Masquerading
Defense Evasion
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

The web application or API relies on an HTTP intermediary to perform security checks, but the intermediary interprets the request differently than the backend, allowing a bypass.

Known Exploits & Detection

GitHubRegression test added in 3.13.3 demonstrating the use of Devanagari digit '5' (\u096b).

Vulnerability Timeline

Vulnerability discovered during Radically Open Security audit
2025-12-01
Patch released in version 3.13.3
2026-01-05
CVE-2025-69225 Published
2026-01-06

References & Sources

  • [1]GHSA-mqqc-3gqh-h2x8 Advisory
  • [2]Python Regex Documentation
Related Vulnerabilities
CVE-2025-69223CVE-2025-69224CVE-2025-69228

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.