Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11143: CWE-20 Improper Input Validation in Eclipse Foundation Eclipse Jetty

0
Low
VulnerabilityCVE-2025-11143cvecve-2025-11143cwe-20
Published: Thu Mar 05 2026 (03/05/2026, 09:26:59 UTC)
Source: CVE Database V5
Vendor/Project: Eclipse Foundation
Product: Eclipse Jetty

Description

CVE-2025-11143 is a vulnerability in the Eclipse Jetty server's URI parser where improper input validation leads to differential URI parsing. This can cause security bypass scenarios when multiple components interpret URIs inconsistently, such as blacklists versus response generators. The issue does not directly impact confidentiality or availability but can affect integrity by allowing bypass of URI-based controls. It affects multiple versions of Jetty from 9. 4. 0 through 12. 1. 0. The CVSS score is low (3. 7) due to the complexity of exploitation and limited impact scope.

AI-Powered Analysis

AILast updated: 03/05/2026, 10:08:13 UTC

Technical Analysis

CVE-2025-11143 concerns an improper input validation vulnerability (CWE-20) in the URI parser component of the Eclipse Jetty server, a widely used Java-based HTTP server and servlet container. Jetty's URI parser differs from other common parsers in how it processes invalid or unusual URIs, leading to differential parsing outcomes. This discrepancy can cause security bypasses in systems where multiple components handle URIs differently—for example, a security component enforcing a blacklist might interpret a URI as malicious, while the response-generating component parses it as benign, or vice versa. Such inconsistencies can allow attackers to circumvent URI-based security controls, potentially exposing implementation details or bypassing access restrictions. The vulnerability affects Jetty versions 9.4.0, 10.0.0, 11.0.0, 12.0.0, and 12.1.0. The CVSS v3.1 score is 3.7 (low), reflecting that exploitation requires network access but has high attack complexity, no privileges or user interaction needed, and impacts integrity with no confidentiality or availability impact. No patches or known exploits are currently documented, but the issue is publicly disclosed and should be addressed by developers and administrators. The vulnerability is particularly relevant in environments where Jetty is integrated with other components that parse URIs differently, such as reverse proxies, firewalls, or application logic layers.

Potential Impact

The primary impact of CVE-2025-11143 is the potential bypass of URI-based security controls due to inconsistent URI parsing across components. This can lead to unauthorized access or actions if security mechanisms rely on URI validation or blacklisting. While the vulnerability does not directly compromise confidentiality or availability, it undermines the integrity of access controls and may expose implementation details that could aid attackers in crafting further attacks. Organizations using Jetty in complex, multi-component web architectures—such as microservices, API gateways, or layered security stacks—are at greater risk. The low CVSS score indicates limited immediate risk, but the subtlety of the issue means it could be exploited in targeted attacks or combined with other vulnerabilities. The absence of known exploits suggests limited current threat, but the vulnerability should be considered in risk assessments and mitigated proactively.

Mitigation Recommendations

To mitigate CVE-2025-11143, organizations should: 1) Monitor for and apply official Jetty patches or updates once released by the Eclipse Foundation. 2) Conduct thorough testing of URI handling across all components in the application stack to identify and resolve differential parsing issues. 3) Implement consistent URI normalization and validation policies across all layers, including proxies, firewalls, and application servers, to ensure uniform interpretation. 4) Avoid relying solely on blacklists for URI filtering; consider whitelist approaches or more robust input validation frameworks. 5) Employ runtime application self-protection (RASP) or web application firewalls (WAFs) configured to detect anomalous URI patterns. 6) Review and harden security controls that depend on URI parsing to reduce reliance on potentially inconsistent interpretations. 7) Maintain comprehensive logging and monitoring for unusual URI access patterns that may indicate exploitation attempts. 8) Educate developers and security teams about the risks of differential parsing and the importance of consistent input validation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
eclipse
Date Reserved
2025-09-29T05:08:52.530Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a952a60e5bba37ca8f75ae

Added to database: 3/5/2026, 9:53:42 AM

Last enriched: 3/5/2026, 10:08:13 AM

Last updated: 3/5/2026, 11:30:15 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses