Request Parameter Leakage in Quarkus REST Framework
CVE-2025-1247
8.3HIGH
Summary
A flaw in Quarkus REST allows for the leakage of request parameters across concurrent requests when endpoints utilize field injection without a CDI scope. This vulnerability can lead to significant security risks, enabling attackers to manipulate request data, impersonate users, and potentially access sensitive information. Organizations utilizing Quarkus REST are advised to review their implementation to mitigate these risks and ensure proper scoping of CDI components.
References
CVSS V3.1
Score:
8.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved