Jan 6, 2026·7 min read·3 visits
Aiohttp versions prior to 3.13.3 scream too loud when they see bad cookies. By sending a header packed with thousands of invalid cookie names, an attacker can force the server to write thousands of warning logs per request. This 'Log Storm' eats CPU cycles, fills disk space, and creates a Denial of Service (DoS) condition on the logging infrastructure.
A resource exhaustion vulnerability in aiohttp allows attackers to trigger a 'logging storm' by sending thousands of malformed HTTP cookies, effectively flooding server logs and consuming excessive CPU/IO.
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U| Product | Affected Versions | Fixed Version |
|---|---|---|
aiohttp aio-libs | < 3.13.3 | 3.13.3 |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-779 |
| Attack Vector | Network |
| CVSS v4.0 | 2.7 (Low) |
| Impact | Resource Exhaustion (DoS) |
| Vulnerability Type | Improper Handling of Excessive Data |
| Component | aiohttp/_cookie_helpers.py |
The product logs an excessive amount of data, which can lead to resource exhaustion or make it difficult to identify important log events.