Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13836: Vulnerability in Python Software Foundation CPython

0
Medium
VulnerabilityCVE-2025-13836cvecve-2025-13836
Published: Mon Dec 01 2025 (12/01/2025, 18:02:38 UTC)
Source: CVE Database V5
Vendor/Project: Python Software Foundation
Product: CPython

Description

When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.

AI-Powered Analysis

AILast updated: 12/23/2025, 20:26:24 UTC

Technical Analysis

CVE-2025-13836 is a vulnerability identified in the Python Software Foundation's CPython implementation, specifically affecting versions 0 through 3.15.0a1. The issue occurs during HTTP response processing when the client does not specify the amount of data to read. In such cases, CPython defaults to using the Content-Length header to determine how much data to read into memory. A malicious HTTP server can exploit this behavior by sending a response with an artificially large Content-Length value, causing the client to allocate excessive memory buffers. This can lead to out-of-memory (OOM) conditions, resulting in denial of service (DoS) by crashing the client or severely degrading its performance. The vulnerability is categorized under CWE-400 (Uncontrolled Resource Consumption). The CVSS 4.0 base score is 6.3 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on availability. No known exploits have been reported in the wild, and no patches have been linked yet. The vulnerability affects any system using the vulnerable CPython versions for HTTP client operations, including web applications, automation scripts, and network tools. The root cause is insufficient validation or limitation on the size of data read based on Content-Length, allowing resource exhaustion. Mitigation will require either patching CPython to enforce stricter limits or application-level controls to validate or cap the expected response size.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to services and applications that rely on CPython for HTTP communications, including web clients, API consumers, and automation tools. Exploitation can lead to denial of service through resource exhaustion, potentially disrupting critical business operations, especially in sectors like finance, healthcare, and government where Python is widely used. The impact on confidentiality and integrity is minimal, as the vulnerability does not allow code execution or data manipulation directly. However, availability degradation can cause service outages or degraded performance, affecting user experience and operational continuity. Organizations with large-scale deployments of Python-based services or those exposed to untrusted HTTP servers are at higher risk. The lack of authentication or user interaction requirements means attackers can exploit this remotely and anonymously, increasing the threat surface. While no known exploits exist yet, the medium severity rating and ease of exploitation warrant proactive mitigation to prevent future attacks.

Mitigation Recommendations

1. Monitor official Python Software Foundation channels for patches addressing CVE-2025-13836 and apply updates promptly once available. 2. Until patches are released, implement application-level safeguards by limiting the maximum allowed Content-Length value when reading HTTP responses. 3. Use HTTP client libraries or wrappers that enforce strict size limits on response bodies to prevent excessive memory allocation. 4. Employ resource monitoring and alerting on systems running vulnerable CPython versions to detect abnormal memory usage patterns indicative of exploitation attempts. 5. Consider isolating or sandboxing Python processes handling untrusted HTTP responses to contain potential DoS impacts. 6. Review and update firewall and network filtering rules to restrict access to internal services that use vulnerable CPython versions from untrusted external sources. 7. Educate developers and system administrators about the vulnerability and encourage secure coding practices around HTTP response handling.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
PSF
Date Reserved
2025-12-01T17:54:40.759Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692ddb371fcc71981e81acee

Added to database: 12/1/2025, 6:15:19 PM

Last enriched: 12/23/2025, 8:26:24 PM

Last updated: 1/15/2026, 10:53:40 PM

Views: 400

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats