-
Vulnerability
-
Resolution: Done-Errata
-
Major
-
8.1.0.GA
-
False
-
-
False
-
-
-
-
-
-
-
-
Researcher
-
CVE-2025-12543
-
9.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L
-
CWE-20
-
undertow-core
-
undertow-core
-
False
-
Important
Security Tracking Issue
Do not make this issue public.
Flaw:
Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF
An Improper Input Validation vulnerability exists in the Undertow HTTP server (io.undertow:undertow-core) where the implementation does not return a 400 Bad Request response when receiving requests with invalid or malformed Host headers. The flaw can be exploited by remote attackers via specially crafted HTTP requests. Depending on the deployment, the issue enables web cache poisoning, session hijacking, or server-side request forgery (SSRF). Attackers may inject malicious responses into caches, steal authentication tokens, or redirect users to malicious endpoints. Successful exploitation can result in complete account takeover, widespread credential theft, or unauthorized access to internal network resources, thereby compromising confidentiality and integrity of user data.
~~~
The following link provides references to all essential vulnerability management information. If something is wrong or missing, please contact a member of PSIRT.
https://spaces.redhat.com/display/PRODSEC/Vulnerability+Management+-+Essential+Documents+for+Engineering+Teams
Tracker accuracy feedback form: https://docs.google.com/forms/d/e/1FAIpQLSfa6zTaEGohRdiIqGVAvWTSAL0kpO_DkkEICuIHzQHFwmKswg/viewform
- is blocked by
-
UNDERTOW-2656 CVE-2025-12543 Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF
-
- Closed
-
-
JBEAP-31345 (8.1.z) Upgrade WildFly Core from 27.1.2.Final-redhat-00002 to 27.1.3.Final-redhat-00001
-
- Closed
-
- is incorporated by
-
JBEAP-30596 (8.1.z) Upgrade Undertow from 2.3.18.SP1-redhat-00001 to 2.3.20.SP2-redhat-00001
-
- Closed
-
-
JBEAP-31380 [GSS](8.1.z) Upgrade JBoss EAP to 8.1.1.GA-redhat-00007 in 8.1 Update 3
-
- Closed
-
- links to
-
RHSA-2025:155585
Red Hat JBoss Enterprise Application Platform 8.1.3 security update
-
RHSA-2025:155586
Red Hat JBoss Enterprise Application Platform 8.1.3 security update
-
RHSA-2025:155588
Red Hat JBoss Enterprise Application Platform 8.1.3 security update