Undertow's Hostile Hospitality: Bypassing Validation via Malformed Headers
Jan 12, 2026·6 min read·115 visits
Executive Summary (TL;DR)
Undertow failed to reject malformed `Host` headers (like `Host: evil.com `), violating RFC 7230. By sending headers that proxies might normalize but Undertow accepts as-is, attackers can poison web caches, hijack sessions, or trigger SSRF. Rated Critical (9.6), this affects JBoss EAP, WildFly, and Keycloak.
A critical input validation failure in the Undertow HTTP server core allows attackers to supply malformed Host headers (containing spaces, tabs, or illegal characters) without triggering a 400 Bad Request. This parsing leniency creates a dangerous desynchronization between front-end proxies and the back-end server, enabling cache poisoning, SSRF, and session hijacking.
Official Patches
Technical Appendix
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:NAffected Systems
Affected Versions Detail
| Product | Affected Versions | Fixed Version |
|---|---|---|
JBoss EAP Red Hat | < 8.1 (Jan 2026 Update) | 8.1.0.GA-patch |
Undertow Core JBoss.org | < 2.3.21.Final | 2.3.21.Final |
| Attribute | Detail |
|---|---|
| CWE ID | CWE-20 (Improper Input Validation) |
| CVSS v3.1 | 9.6 (Critical) |
| Attack Vector | Network (Remote) |
| Impact | Cache Poisoning, SSRF, Session Hijacking |
| EPSS Score | 0.13% |
| Exploit Status | PoC Available / Weaponized Context |
MITRE ATT&CK Mapping
The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.
Known Exploits & Detection
Vulnerability Timeline
Subscribe to updates
Get the latest CVE analysis reports delivered to your inbox.