Description
A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.
Published: 2026-01-07
Score: 9.6 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw is in the core of the Undertow HTTP server, the component used in WildFly, JBoss EAP, and other Java applications. It fails to validate the Host header of incoming HTTP requests. As a result, requests that contain malformed or malicious Host headers are accepted instead of rejected, enabling attackers to poison server caches, carry out internal network scans, or hijack user sessions. This weakness is classified as input validation (CWE‑20).

Affected Systems

The vulnerability impacts the Red Hat product families that embed Undertow: Red Hat Enterprise Linux 8, 9, and 10; Red Hat Data Grid 8; Red Hat Fuse 7; Red Hat JBoss Enterprise Application Platform 7.4, 8.0, 8.1; the Enterprise Application Platform Expansion Pack; Red Hat Process Automation 7; Red Hat Single Sign‑On 7; as well as Red Hat builds of Apache Camel HawtIO 4 and Apache Camel 4.14.4 for Spring Boot 3.5.11. No specific Undertow or Java application version numbers are provided in the supplied data.

Risk and Exploitability

With a CVSS score of 9.6 and an EPSS score below 1%, the flaw is high severity but has a low exploitation probability under normal circumstances. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker would need network access to a publicly or internally reachable HTTP service running an affected Undertow‑based application and would inject a crafted Host header to manipulate cache entries, trigger internal scans, or hijack user sessions. The high severity score indicates substantial impact on confidentiality, integrity, and availability if exploitation succeeds.

Generated by OpenCVE AI on April 29, 2026 at 11:00 UTC.

Remediation

Vendor Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use, applicability, or stability.


OpenCVE Recommended Actions

  • Install the Red Hat security updates RHSA‑2026:0383, RHSA‑2026:0384, and RHSA‑2026:0386 to patch the Undertow Host header validation flaw.
  • Apply the Red Hat security updates RHSA‑2026:3889, RHSA‑2026:3890, RHSA‑2026:3891, and RHSA‑2026:3892, which provide additional fixes for upstream dependencies.
  • Deploy the Red Hat security updates RHSA‑2026:4915, RHSA‑2026:4916, RHSA‑2026:4917, and RHSA‑2026:4924 to complete the patch coverage for all affected Red Hat products.

Generated by OpenCVE AI on April 29, 2026 at 11:00 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-j382-5jj3-vw4j Undertow HTTP server core doesn't properly validate the Host header in incoming HTTP requests
Ubuntu USN Ubuntu USN USN-8144-1 Undertow vulnerability
History

Wed, 18 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Redhat jboss Enterprise Application Platform Els
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:7 cpe:/a:redhat:jboss_enterprise_application_platform:7.4
cpe:/a:redhat:jboss_enterprise_application_platform_els:7.4::el7
cpe:/a:redhat:jboss_enterprise_application_platform_els:7.4::el8
cpe:/a:redhat:jboss_enterprise_application_platform_els:7.4::el9
Vendors & Products Redhat jboss Enterprise Application Platform Els
References

Tue, 10 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat build Of Apache Camel
Redhat data Grid
Redhat fuse
Redhat jboss Enterprise Application Platform Expansion Pack
Redhat process Automation
Redhat single Sign-on
Redhat undertow
CPEs cpe:2.3:a:redhat:build_of_apache_camel:*:*:*:*:*:spring_boot:*:*
cpe:2.3:a:redhat:data_grid:8.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:fuse:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_enterprise_application_platform_expansion_pack:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*
Vendors & Products Redhat build Of Apache Camel
Redhat data Grid
Redhat fuse
Redhat jboss Enterprise Application Platform Expansion Pack
Redhat process Automation
Redhat single Sign-on
Redhat undertow

Thu, 05 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el9
References

Thu, 05 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 05 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat apache Camel Spring Boot
CPEs cpe:/a:redhat:camel_spring_boot:4 cpe:/a:redhat:apache_camel_spring_boot:4.14
Vendors & Products Redhat camel Spring Boot
Redhat apache Camel Spring Boot
References

Thu, 08 Jan 2026 22:45:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:8.1::el8
References

Thu, 08 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:jboss_enterprise_application_platform:8 cpe:/a:redhat:jboss_enterprise_application_platform:8.0::el8
cpe:/a:redhat:jboss_enterprise_application_platform:8.1::el9
References

Thu, 08 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Wed, 07 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 07 Jan 2026 16:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.
Title Undertow-core: undertow http server fails to reject malformed host headers leading to potential cache poisoning and ssrf
First Time appeared Redhat
Redhat apache Camel Hawtio
Redhat camel Spring Boot
Redhat enterprise Linux
Redhat jboss Data Grid
Redhat jboss Enterprise Application Platform
Redhat jboss Enterprise Bpms Platform
Redhat jboss Fuse
Redhat jbosseapxp
Redhat red Hat Single Sign On
Weaknesses CWE-20
CPEs cpe:/a:redhat:apache_camel_hawtio:4
cpe:/a:redhat:camel_spring_boot:4
cpe:/a:redhat:jboss_data_grid:8
cpe:/a:redhat:jboss_enterprise_application_platform:7
cpe:/a:redhat:jboss_enterprise_application_platform:8
cpe:/a:redhat:jboss_enterprise_bpms_platform:7
cpe:/a:redhat:jboss_fuse:7
cpe:/a:redhat:jbosseapxp
cpe:/a:redhat:red_hat_single_sign_on:7
cpe:/o:redhat:enterprise_linux:10
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat apache Camel Hawtio
Redhat camel Spring Boot
Redhat enterprise Linux
Redhat jboss Data Grid
Redhat jboss Enterprise Application Platform
Redhat jboss Enterprise Bpms Platform
Redhat jboss Fuse
Redhat jbosseapxp
Redhat red Hat Single Sign On
References
Metrics cvssV3_1

{'score': 9.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L'}


Subscriptions

Redhat Apache Camel Hawtio Apache Camel Spring Boot Build Of Apache Camel Data Grid Enterprise Linux Fuse Jboss Data Grid Jboss Enterprise Application Platform Jboss Enterprise Application Platform Els Jboss Enterprise Application Platform Expansion Pack Jboss Enterprise Bpms Platform Jboss Fuse Jbosseapxp Process Automation Red Hat Single Sign On Single Sign-on Undertow
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-29T03:55:30.656Z

Reserved: 2025-10-31T06:48:03.659Z

Link: CVE-2025-12543

cve-icon Vulnrichment

Updated: 2026-01-07T16:35:51.149Z

cve-icon NVD

Status : Modified

Published: 2026-01-07T17:15:55.093

Modified: 2026-03-18T16:16:22.420

Link: CVE-2025-12543

cve-icon Redhat

Severity : Important

Publid Date: 2026-01-07T00:00:00Z

Links: CVE-2025-12543 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T11:15:09Z

Weaknesses