Skip to content

Conversation

@Roaimkhan
Copy link

Description:

The current aiohttp pin allows installation of versions affected by a known DoS vulnerability (fixed in 3.13.3). https://www.cve.org/CVERecord?id=CVE-2025-69223

This change raises the minimum supported version to 3.13.3 while keeping an upper bound of <4 to avoid unreviewed breaking changes from a future major release.

This ensures users enabling the optional aiohttp extra are not exposed to the reported vulnerability by default.

Fixes #1950

@janasangeetha janasangeetha self-assigned this Jan 30, 2026
@janasangeetha janasangeetha added the size:S Code changes < 10 lines label Jan 30, 2026
@janasangeetha
Copy link
Collaborator

Hey @Roaimkhan
Thanks for contributing!
The branch is out-of-date. Could you please update the same.

@Roaimkhan
Copy link
Author

@janasangeetha Branch Upadated!

@janasangeetha
Copy link
Collaborator

@Roaimkhan Please check the failing checks and update the same.

@Roaimkhan Roaimkhan changed the title chore:updating aiohttp version in project.toml file chore: updating aiohttp version in project.toml file Jan 30, 2026
@Roaimkhan
Copy link
Author

Roaimkhan commented Jan 30, 2026

@janasangeetha Done! is there anthing else I could help with reagrding the PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

size:S Code changes < 10 lines

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Bump aiohttp version

2 participants