Host Header Vulnerability in Undertow HTTP Server for WildFly and JBoss EAP
CVE-2025-12543

9.6CRITICAL

What is CVE-2025-12543?

A flaw exists in the core of the Undertow HTTP server, utilized by WildFly and JBoss EAP. This vulnerability arises from inadequate validation of the Host header in incoming HTTP requests. Malicious or malformed Host headers are not properly rejected, allowing attackers to exploit this weakness. Consequently, they can poison caches, perform scans of internal networks, or hijack user sessions, posing serious security risks to affected applications.

Affected Version(s)

Red Hat JBoss Enterprise Application Platform 8.1 for RHEL 8 0:4.0.10-1.redhat_00001.1.el8eap

Red Hat JBoss Enterprise Application Platform 8.1 for RHEL 8 0:1.82.0-1.redhat_00001.1.el8eap

Red Hat JBoss Enterprise Application Platform 8.1 for RHEL 8 0:801.3.0-1.GA_redhat_00001.1.el8eap

References

CVSS V3.1

Score:
9.6
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Red Hat would like to thank Ahmet Artuç for reporting this issue.
.
CVE-2025-12543 : Host Header Vulnerability in Undertow HTTP Server for WildFly and JBoss EAP