Bug 2408784 (CVE-2025-12543) - CVE-2025-12543 undertow-core: Undertow HTTP Server Fails to Reject Malformed Host Headers Leading to Potential Cache Poisoning and SSRF
Summary: CVE-2025-12543 undertow-core: Undertow HTTP Server Fails to Reject Malformed ...
Keywords:
Status: NEW
Alias: CVE-2025-12543
Deadline: 2026-01-09
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2427892 2427893 2427894 2427895
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-10-31 06:53 UTC by OSIDB Bzimport
Modified: 2026-02-18 08:28 UTC (History)
45 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:0383 0 None None None 2026-01-08 16:54:56 UTC
Red Hat Product Errata RHSA-2026:0384 0 None None None 2026-01-08 16:55:19 UTC
Red Hat Product Errata RHSA-2026:0386 0 None None None 2026-01-08 16:53:58 UTC

Description OSIDB Bzimport 2025-10-31 06:53:28 UTC
An Improper Input Validation vulnerability exists in the Undertow HTTP server (io.undertow:undertow-core) where the implementation does not return a 400 Bad Request response when receiving requests with invalid or malformed Host headers. The flaw can be exploited by remote attackers via specially crafted HTTP requests. Depending on the deployment, the issue enables web cache poisoning, session hijacking, or server-side request forgery (SSRF). Attackers may inject malicious responses into caches, steal authentication tokens, or redirect users to malicious endpoints. Successful exploitation can result in complete account takeover, widespread credential theft, or unauthorized access to internal network resources, thereby compromising confidentiality and integrity of user data.

Comment 1 errata-xmlrpc 2026-01-08 16:53:55 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 8.1

Via RHSA-2026:0386 https://access.redhat.com/errata/RHSA-2026:0386

Comment 2 errata-xmlrpc 2026-01-08 16:54:52 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 8.1 for RHEL 8

Via RHSA-2026:0383 https://access.redhat.com/errata/RHSA-2026:0383

Comment 3 errata-xmlrpc 2026-01-08 16:55:15 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 8.1 for RHEL 9

Via RHSA-2026:0384 https://access.redhat.com/errata/RHSA-2026:0384


Note You need to log in before you can comment on or make changes to this bug.