Skip to content

[Aikido] Fix 18 security issues in protobuf, aiohttp, pypdf and 1 more#25

Closed
aikido-autofix[bot] wants to merge 1 commit intomainfrom
fix/aikido-security-update-packages-17557111-gEHM
Closed

[Aikido] Fix 18 security issues in protobuf, aiohttp, pypdf and 1 more#25
aikido-autofix[bot] wants to merge 1 commit intomainfrom
fix/aikido-security-update-packages-17557111-gEHM

Conversation

@aikido-autofix
Copy link

Upgrade protobuf, aiohttp, and pypdf to mitigate critical DoS vulnerabilities involving recursive parsing, compressed requests, and PDF processing.

✅ 18 CVEs resolved by this upgrade

This PR will resolve the following CVEs:

Issue Severity           Description
CVE-2026-0994
HIGH
[protobuf] ParseDict() fails to properly track recursion depth when handling nested Any messages, allowing attackers to bypass the max_recursion_depth limit and trigger a RecursionError, causing denial of service.
CVE-2025-69223
HIGH
[aiohttp] A zip bomb vulnerability allows attackers to send compressed requests that exhaust server memory when decompressed, causing denial of service. An attacker can trigger excessive memory consumption on the AIOHTTP server through specially crafted compressed payloads.
CVE-2025-69227
HIGH
[aiohttp] A bypass of assert statements when Python optimizations are enabled allows attackers to trigger an infinite loop during POST body processing, causing a denial of service. The vulnerability affects applications using the Request.post() method with optimization flags enabled.
CVE-2025-69228
HIGH
[aiohttp] A vulnerability allows attackers to craft requests that cause uncontrolled memory consumption in servers using the Request.post() method, leading to denial of service through memory exhaustion. An attacker can freeze the server by triggering this memory filling behavior during request processing.
CVE-2025-69224
MEDIUM
[aiohttp] The Python HTTP parser allows request smuggling attacks when non-ASCII characters are present in pure Python mode, enabling attackers to bypass firewall and proxy protections. This vulnerability could lead to unauthorized request routing and security control evasion.
CVE-2025-69229
MEDIUM
[aiohttp] Chunked message handling causes excessive blocking CPU usage when processing large numbers of chunks, allowing attackers to trigger denial of service by consuming server resources and preventing other requests from being handled.
CVE-2025-69225
MEDIUM
[aiohttp] The HTTP Range header parser accepts non-ASCII decimal characters, potentially enabling request smuggling attacks. While no known exploits exist, this parsing flaw could allow attackers to bypass security controls or manipulate request interpretation.
CVE-2025-69226
MEDIUM
[aiohttp] Path normalization logic in static file handling allows attackers to enumerate absolute path components on the server through information disclosure. This vulnerability affects applications using web.static() and could enable attackers to map the filesystem structure.
CVE-2025-69230
MEDIUM
[aiohttp] A logging storm vulnerability exists where reading multiple invalid cookies can trigger excessive warning-level logs, potentially causing a denial of service through log flooding when an attacker sends a specially crafted Cookie header.
CVE-2026-27628
HIGH
[pypdf] is a free and open-source pure-python PDF library. Prior to 6.7.2, an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This requires reading the file. This has been fixed in pypdf 6.7.2. As a workaround, one may apply the patch manually.
CVE-2025-66019
MEDIUM
[pypdf] A crafted PDF with LZWDecode-filtered content streams can cause excessive memory consumption up to 1 GB per stream, leading to denial of service. This vulnerability is triggered when parsing malicious PDF content streams.
CVE-2026-27024
MEDIUM
[pypdf] is a free and open-source pure-python PDF library. Prior to 6.7.1, an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This requires accessing the children of a TreeObject, for example as part of outlines. This vulnerability is fixed in 6.7.1.
CVE-2026-27025
MEDIUM
[pypdf] A crafted PDF with unusually large values in a font's /ToUnicode entry can cause excessive memory consumption and long runtimes during text extraction. This leads to a denial-of-service condition.
CVE-2026-27026
MEDIUM
[pypdf] is a free and open-source pure-python PDF library. Prior to 6.7.1, an attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires a malformed /FlateDecode stream, where the byte-by-byte decompression is used. This vulnerability is fixed in 6.7.1.
CVE-2026-22691
MEDIUM
[pypdf] A malformed startxref entry in a crafted PDF can cause excessively long runtimes during cross-reference table rebuilding in non-strict mode, resulting in a denial of service attack through resource exhaustion.
CVE-2026-24688
MEDIUM
[pypdf] An infinite loop vulnerability in PDF outline/bookmark processing allows attackers to craft malicious PDFs that cause denial of service by consuming CPU resources indefinitely. This vulnerability can be exploited when accessing PDF outlines or bookmarks.
CVE-2026-22690
LOW
[pypdf] A crafted PDF with a missing /Root object and large /Size value can cause excessively long runtimes in non-strict reading mode, enabling denial-of-service attacks. An attacker can exploit this to make invalid PDF files appear to take significant processing time.
GHSA-rcfx-77hg-w2wv
HIGH
[fastmcp] Allows installation of vulnerable MCP SDK versions that are susceptible to remote code execution through improper input validation. Users should upgrade to mitigate exposure to the underlying MCP SDK vulnerability.

@aikido-autofix aikido-autofix bot closed this Feb 27, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants