CVE-2025-12543

Undertow's Hostile Hospitality: Bypassing Validation via Malformed Headers

Alon Barad
Alon Barad
Software Engineer

Jan 12, 2026·6 min read·115 visits

Executive Summary (TL;DR)

Undertow failed to reject malformed `Host` headers (like `Host: evil.com `), violating RFC 7230. By sending headers that proxies might normalize but Undertow accepts as-is, attackers can poison web caches, hijack sessions, or trigger SSRF. Rated Critical (9.6), this affects JBoss EAP, WildFly, and Keycloak.

A critical input validation failure in the Undertow HTTP server core allows attackers to supply malformed Host headers (containing spaces, tabs, or illegal characters) without triggering a 400 Bad Request. This parsing leniency creates a dangerous desynchronization between front-end proxies and the back-end server, enabling cache poisoning, SSRF, and session hijacking.

Technical Appendix

CVSS Score
9.6/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N
EPSS Probability
0.13%
Top 66% most exploited

Affected Systems

Red Hat JBoss Enterprise Application Platform (EAP) 7Red Hat JBoss Enterprise Application Platform (EAP) 8Red Hat Single Sign-On (Keycloak) 7WildFly (versions prior to fix)Red Hat Data Grid 8Red Hat Build of Apache Camel

Affected Versions Detail

Product
Affected Versions
Fixed Version
JBoss EAP
Red Hat
< 8.1 (Jan 2026 Update)8.1.0.GA-patch
Undertow Core
JBoss.org
< 2.3.21.Final2.3.21.Final
AttributeDetail
CWE IDCWE-20 (Improper Input Validation)
CVSS v3.19.6 (Critical)
Attack VectorNetwork (Remote)
ImpactCache Poisoning, SSRF, Session Hijacking
EPSS Score0.13%
Exploit StatusPoC Available / Weaponized Context
CWE-20
Improper Input Validation

The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program.

Vulnerability Timeline

Vulnerability reported to Red Hat by Ahmet Artuç
2025-10-31
CVE-2025-12543 assigned and published
2026-01-07
Red Hat releases security advisories and patches
2026-01-08

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.