Critical Severity Vulnerability
This vulnerability has been rated as Critical severity. Immediate action is recommended.
CVE-2025-13836
CriticalVulnerability Description
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Known Affected Software
2 configuration(s) from 1 vendor(s)
cpe:2.3:a:python:python:3.15.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:python:python:3.14.0:-:*:*:*:*:*:*
USN-7951-1
USN-7951-1: Python vulnerability
CVE-2025-13836
CVE-2025-13836
References & Resources
-
https://github.com/python/cpython/commit/14b1fdb0a94b96f86fc7b86671ea9582b8676628cna@python.org Patch
-
https://github.com/python/cpython/commit/289f29b0fe38baf2d7cb5854f4bb573cc34a6a15cna@python.org Patch
-
https://github.com/python/cpython/commit/4ce27904b597c77d74dd93f2c912676021a99155cna@python.org Patch
-
https://github.com/python/cpython/commit/5a4c4a033a4a54481be6870aa1896fad732555b5cna@python.org Patch
-
https://github.com/python/cpython/issues/119451cna@python.org Issue Tracking Patch
-
https://github.com/python/cpython/pull/119454cna@python.org Issue Tracking Patch
-
https://mail.python.org/archives/list/security-announce@python.org/thread/OQ6G7MKRQIS3OAREC3HNG3D2DPOU34XO/cna@python.org Vendor Advisory
Severity Details
Key Information
- Published Date
- December 01, 2025
