Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12543: Improper Input Validation in Red Hat Red Hat build of Apache Camel 4.14.4 for Spring Boot 3.5.11

0
Critical
VulnerabilityCVE-2025-12543cvecve-2025-12543
Published: Wed Jan 07 2026 (01/07/2026, 16:04:22 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Apache Camel 4.14.4 for Spring Boot 3.5.11

Description

A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/08/2026, 01:54:53 UTC

Technical Analysis

The vulnerability CVE-2025-12543 affects the Undertow HTTP server core, which fails to properly validate the Host header in HTTP requests. This improper input validation allows attackers to send requests with malformed or malicious Host headers that the server processes without rejection. The impact includes potential cache poisoning, internal network scanning, and user session hijacking. Red Hat's JBoss Enterprise Application Platform 8.1.3 update includes a fix by upgrading Undertow to versions 2.3.20.SP2 and later. The vulnerability is rated critical with a CVSS 3.1 score of 9.6 (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L). The vendor advisory confirms the availability of patches for RHEL 8 and 9 platforms and recommends applying these updates after ensuring all prior errata are applied.

Potential Impact

Successful exploitation of this vulnerability can lead to cache poisoning, allowing attackers to manipulate cached content served to users. It also enables server-side request forgery (SSRF), which can be used to scan internal networks or access internal resources. Additionally, session hijacking is possible, potentially compromising user accounts. The CVSS score of 9.6 reflects critical impact on confidentiality, integrity, and low impact on availability. No known exploits in the wild have been reported so far.

Mitigation Recommendations

Red Hat has released official security updates for JBoss Enterprise Application Platform 8.1.3 on Red Hat Enterprise Linux 8 and 9 that address CVE-2025-12543 by upgrading the Undertow HTTP server component. Users should apply these updates promptly after verifying that all previously released errata relevant to their systems have been applied. Backing up existing installations, including applications, configuration files, and databases, is recommended before applying the update. Detailed update instructions are available in the Red Hat advisory and knowledge base articles linked in the vendor advisory. No additional mitigations are indicated by the vendor advisory.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-10-31T06:48:03.659Z
Cvss Version
3.1
State
PUBLISHED
Vendor Advisory Urls
[{"url":"https://access.redhat.com/errata/RHSA-2026:0383","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2026:0384","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2026:0386","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2026:3889","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2026:3890","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2026:3891","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2026:3892","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2026:4915","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2026:4916","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2026:4917","vendor":"Red Hat"},{"url":"https://access.redhat.com/errata/RHSA-2026:4924","vendor":"Red Hat"},{"url":"https://access.redhat.com/security/cve/CVE-2025-12543","vendor":"Red Hat"}]

Threat ID: 695e89727349d0379daecb48

Added to database: 1/7/2026, 4:27:30 PM

Last enriched: 5/8/2026, 1:54:53 AM

Last updated: 5/9/2026, 8:16:26 PM

Views: 2121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses