Bug 2427245 (CVE-2025-69226)

Summary: CVE-2025-69226 aiohttp: aiohttp: Information disclosure of path components via static file path normalization
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: adudiak, alinfoot, anpicker, anthomas, bbrownin, bdettelb, bparees, carogers, caswilli, dfreiber, doconnor, drow, dtrifiro, dymurray, ehelms, erezende, ggainey, haoli, hasun, hkataria, ibolton, jajackso, jburrell, jcammara, jdobes, jfula, jkoehler, jmatthew, jmitchel, jmontleo, jneedle, jowilson, jsamir, juwatts, jwong, kaycoth, kegrant, koliveir, kshier, lphiri, mabashia, mhulan, nmoumoul, nyancey, omaciel, ometelka, orabin, osousa, pakotvan, pbohmill, pbraun, pcreech, pgaikwad, ptisnovs, rbryant, rchan, rjohnson, shvarugh, simaishi, slucidi, smallamp, smcdonal, sseago, stcannon, sthirugn, syedriko, teagle, tfister, thavo, tmalecek, ttakamiy, vkumar, weaton, xdharmai, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in aiohttp, an asynchronous HTTP client/server framework for Python. An attacker can exploit a vulnerability in the path normalization logic for static files to determine if specific absolute path components exist on the server. This information disclosure is possible if the application uses web.static().
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2026-01-05 23:01:15 UTC
AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below enable an attacker to ascertain the existence of absolute path components through the path normalization logic for static files meant to prevent path traversal. If an application uses web.static() (not recommended for production deployments), it may be possible for an attacker to ascertain the existence of path components. This issue is fixed in version 3.13.3.