CVE-2025-13836
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-01

Last updated on: 2026-02-10

Assigner: Python Software Foundation

Description
When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-01
Last Modified
2026-02-10
Generated
2026-05-07
AI Q&A
2025-12-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
python cpython From 3.13.1 (inc) to 3.13.11 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability occurs when reading an HTTP response from a server without specifying a read amount. The default behavior uses the Content-Length header, which a malicious server can exploit to cause the client to read excessively large amounts of data into memory. This can lead to out-of-memory (OOM) conditions or other denial-of-service (DoS) effects.


How can this vulnerability impact me? :

The vulnerability can cause your client application to consume excessive memory by reading large amounts of data, potentially leading to out-of-memory errors or denial-of-service conditions that disrupt normal operation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart