The vulnerability in Quarkus REST arises when REST endpoints are implemented without a CDI scope and utilize field injection for request parameters. In such cases, a single instance of the endpoint class is shared across multiple concurrent requests, leading to the potential exchange of request parameters between these requests. This means that data such as HTTP headers, URI templates, cookies, and form values from one request can inadvertently be accessed by another, posing significant security risks.Affected applications should ensure proper scoping with @RequestScoped or avoid field injection for request parameters. The issue is fixed in version 3.18.2.
This issue has been addressed in the following products: Red Hat build of Quarkus 3.15.3.SP1 Via RHSA-2025:1885 https://access.redhat.com/errata/RHSA-2025:1885
This issue has been addressed in the following products: Red Hat build of Quarkus 3.8.6.SP3 Via RHSA-2025:1884 https://access.redhat.com/errata/RHSA-2025:1884
This issue has been addressed in the following products: Red Hat Build of Apache Camel 4.8 for Quarkus 3.15 Via RHSA-2025:2067 https://access.redhat.com/errata/RHSA-2025:2067