CVE-2025-12543
CRITICAL WAF: Medium
CVSS 9.6
Published: 2026-01-07
CWE-20
A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.
WAF Coverage Analysis
Improper Input Validation
Medium WAF Coverage
OWASP: A03:2021 Injection
920xxx - Protocol Enforcement 941xxx - XSS / XXE 942xxx - SQL Injection
Affected Software
| Vendor | Product | Version |
|---|---|---|
| redhat | build_of_apache_camel | up to 4.14.4 |
| redhat | data_grid | 8.0 |
| redhat | fuse | 7.0.0 |
| redhat | jboss_enterprise_application_platform | 8.0 - 8.0.12 |
| redhat | jboss_enterprise_application_platform | 8.1.0 - 8.1.3 |
| redhat | jboss_enterprise_application_platform | - |
| redhat | jboss_enterprise_application_platform | 7.0.0 |
| redhat | jboss_enterprise_application_platform_expansion_pack | - |
| redhat | process_automation | 7.0 |
| redhat | single_sign-on | 7.0 |
References
- access.redhat.com (Vendor Advisory)
- access.redhat.com (Vendor Advisory)
- access.redhat.com (Vendor Advisory)
- access.redhat.com (Vendor Advisory)
- access.redhat.com (Vendor Advisory)
- access.redhat.com (Vendor Advisory)
- access.redhat.com (Vendor Advisory)
- access.redhat.com
- access.redhat.com
- access.redhat.com