HTTP Request Smuggling Vulnerability in Eventlet Networking Library
CVE-2025-58068

6.3MEDIUM

Key Information:

Vendor

Eventlet

Status
Vendor
CVE Published:
29 August 2025

What is CVE-2025-58068?

Eventlet, a concurrent networking library for Python, has a vulnerability in its WSGI parser that affects versions prior to 0.40.3. This flaw arises from improper handling of HTTP trailer sections, which could allow attackers to bypass security measures, execute targeted attacks against users, and compromise web cache integrity. Although this issue has been mitigated in Eventlet version 0.40.3 by eliminating trailer support—resulting in potential compatibility issues—it is recommended that developers avoid utilizing eventlet.wsgi in scenarios involving untrusted clients to safeguard their applications.

Affected Version(s)

eventlet < 0.40.3

References

CVSS V4

Score:
6.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-58068 : HTTP Request Smuggling Vulnerability in Eventlet Networking Library