VYPR
Critical severityOSV Advisory· Published Jan 7, 2026· Updated Apr 29, 2026

Undertow-core: undertow http server fails to reject malformed host headers leading to potential cache poisoning and ssrf

CVE-2025-12543

Description

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
io.undertow:undertow-coreMaven
>= 2.3.0.Alpha1, < 2.3.21.Final2.3.21.Final
io.undertow:undertow-coreMaven
< 2.2.39.Final2.2.39.Final

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

20

News mentions

0

No linked articles in our index yet.