CVE-2025-58068
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-08-29

Last updated on: 2025-11-03

Assigner: GitHub, Inc.

Description
Eventlet is a concurrent networking library for Python. Prior to version 0.40.3, the Eventlet WSGI parser is vulnerable to HTTP Request Smuggling due to improper handling of HTTP trailer sections. This vulnerability could enable attackers to, bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. This problem has been patched in Eventlet 0.40.3 by dropping trailers which is a breaking change if a backend behind eventlet.wsgi proxy requires trailers. A workaround involves not using eventlet.wsgi facing untrusted clients.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-08-29
Last Modified
2025-11-03
Generated
2026-05-07
AI Q&A
2025-08-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
eventlet eventlet to 0.40.3 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-444 The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Eventlet Python library's WSGI parser before version 0.40.3. It is an HTTP Request Smuggling issue caused by improper handling of HTTP trailer sections. Attackers can exploit this flaw to bypass front-end security controls, launch targeted attacks against active site users, and poison web caches. The vulnerability was fixed in version 0.40.3 by dropping trailers, which may break functionality if the backend requires trailers.


How can this vulnerability impact me? :

If exploited, this vulnerability can allow attackers to bypass security controls on the front end, potentially leading to unauthorized access or manipulation of web traffic. Attackers could target active users with specific attacks or poison web caches, which may result in serving malicious or incorrect content to users.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, upgrade Eventlet to version 0.40.3 or later where the issue is patched by dropping HTTP trailers. If upgrading is not immediately possible, avoid using eventlet.wsgi facing untrusted clients as a workaround.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart