DNA View

Critical Severity Vulnerability

This vulnerability has been rated as Critical severity. Immediate action is recommended.

CVE-2025-13836

Critical
Low Medium High Critical
9.1
CVSS Score
Published: Dec 01, 2025
Last Modified: Dec 30, 2025

Vulnerability Description

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Attack Vector
N
Attack Complexity
L
Privileges Required
N
User Interaction
N
Scope
U
Confidentiality
H
Integrity
N
Availability
H

Known Affected Software

2 configuration(s) from 1 vendor(s)

python
Version:
3.15.0
CPE:
cpe:2.3:a:python:python:3.15.0:alpha1:*:*:*:*:*:*
python
Version:
3.14.0
CPE:
cpe:2.3:a:python:python:3.14.0:-:*:*:*:*:*:*
This vulnerability affects 2 software configuration(s). Ensure you patch all affected systems.

Available Security Patches

2 patches available from vendors

View All Patches
Canonical (Ubuntu)

USN-7951-1

USN-7951-1: Python vulnerability

Severity
Unknown
Released
Jan 12, 2026
Security Update
SUSE

CVE-2025-13836

CVE-2025-13836

Severity
Unknown
Released
Dec 23, 2025
Security Update

Severity Details

9.1
out of 10.0
Critical

Key Information

Published Date
December 01, 2025