On Windows the static resource handler may expose information about a NTLMv2 remote path.
If an application is running on Windows, and using aiohttp's static resource handler (not recommended in production), then it may be possible for an attacker to extract the hash from an NTLMv2 path and then extract the user's credentials from there.
Patch: https://github.com/aio-libs/aiohttp/commit/0ae2aa076c84573df83fc1fdc39eec0f5862fe3d
{
"github_reviewed": true,
"github_reviewed_at": "2026-04-01T21:26:36Z",
"severity": "MODERATE",
"cwe_ids": [
"CWE-36",
"CWE-918"
],
"nvd_published_at": null
}