Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-1247: Exposure of Data Element to Wrong Session

0
High
VulnerabilityCVE-2025-1247cvecve-2025-1247
Published: Thu Feb 13 2025 (02/13/2025, 13:26:26 UTC)
Source: CVE Database V5

Description

A flaw was found in Quarkus REST that allows request parameters to leak between concurrent requests if endpoints use field injection without a CDI scope. This vulnerability allows attackers to manipulate request data, impersonate users, or access sensitive information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:22:25 UTC

Technical Analysis

CVE-2025-1247 identifies a critical vulnerability in the Quarkus REST framework, specifically related to how request parameters are handled in concurrent requests when endpoints use field injection without specifying a Contexts and Dependency Injection (CDI) scope. Quarkus REST is a popular Java framework for building cloud-native microservices. The flaw allows data from one user's request to leak into another user's session due to improper isolation of request-scoped data. This occurs because field injection without a CDI scope causes shared state across concurrent requests, violating session boundaries. Attackers with limited privileges can exploit this to manipulate request parameters, impersonate other users, or access sensitive information belonging to other sessions. The vulnerability has a CVSS v3.1 score of 8.3, reflecting high impact on confidentiality and integrity, with low attack complexity and no user interaction required. Although no public exploits are currently known, the vulnerability poses a significant risk to applications relying on affected Quarkus REST versions. The root cause lies in the misuse of dependency injection patterns and insufficient session management in the framework's request handling. Mitigation requires developers to avoid field injection without CDI scopes and to update to patched versions once available.

Potential Impact

The impact of CVE-2025-1247 is substantial for organizations using Quarkus REST in their Java microservices architectures. Exploitation can lead to unauthorized data disclosure, allowing attackers to access sensitive information from other users' sessions. This compromises confidentiality and can also affect integrity by enabling attackers to manipulate request data or impersonate legitimate users. Such breaches can result in data leaks, unauthorized transactions, and loss of user trust. The vulnerability's ease of exploitation (low complexity, no user interaction) increases the risk of automated attacks in multi-tenant or high-concurrency environments. Additionally, the flaw could facilitate lateral movement within compromised environments if attackers leverage session data to escalate privileges. The availability impact is low but the confidentiality and integrity risks are high, making this a critical concern for cloud-native applications, financial services, healthcare, and any sector handling sensitive user data. Organizations may face regulatory penalties and reputational damage if exploited.

Mitigation Recommendations

To mitigate CVE-2025-1247, organizations should immediately review their use of Quarkus REST endpoints to ensure that field injection is not used without an appropriate CDI scope, such as @RequestScoped. Developers should refactor code to use constructor or method injection with proper scoping to guarantee request isolation. Applying the latest patches or updates from the Quarkus project as soon as they become available is critical. In the interim, implementing strict input validation and monitoring for anomalous request patterns can help detect exploitation attempts. Additionally, deploying Web Application Firewalls (WAFs) with rules tailored to detect unusual session behavior may provide a layer of defense. Conducting thorough code reviews and security testing focused on dependency injection usage and session management will reduce risk. Organizations should also educate developers on secure CDI practices and consider isolating critical services to limit the blast radius of potential exploits.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-02-12T09:43:11.716Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68af0c87ad5a09ad00627bd4

Added to database: 8/27/2025, 1:47:51 PM

Last enriched: 3/24/2026, 12:22:25 AM

Last updated: 5/9/2026, 8:23:27 AM

Views: 196

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses