Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49574: CWE-668: Exposure of Resource to Wrong Sphere in quarkusio quarkus

0
Medium
VulnerabilityCVE-2025-49574cvecve-2025-49574cwe-668
Published: Mon Jun 23 2025 (06/23/2025, 19:47:05 UTC)
Source: CVE Database V5
Vendor/Project: quarkusio
Product: quarkus

Description

Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. In versions prior to 3.24.1, 3.20.2, and 3.15.6, there is a potential data leak when duplicating a duplicated context. Quarkus extensively uses the Vert.x duplicated context to implement context propagation. With the new semantic data from one transaction can leak to the data from another transaction. From a Vert.x point of view, this new semantic clarifies the behavior. A significant amount of data is stored in the duplicated context, including request scope, security details, and metadata. Duplicating a duplicated context is rather rare and is only done in a few places. This issue has been patched in version 3.24.1, 3.20.2, and 3.15.6.

AI-Powered Analysis

AILast updated: 12/22/2025, 19:54:13 UTC

Technical Analysis

CVE-2025-49574 is a vulnerability in the Quarkus framework, a cloud-native, container-first Java framework that leverages Vert.x for context propagation. The issue arises when a duplicated Vert.x context is duplicated again, a rare but possible operation in Quarkus. This leads to exposure of sensitive data stored within the duplicated context, including request scope information, security credentials, and metadata, across transaction boundaries. Essentially, data from one transaction can leak into another, violating isolation principles and potentially exposing confidential information to unauthorized transactions. The vulnerability affects Quarkus versions prior to 3.24.1, 3.20.2, and 3.15.6, with specific version ranges detailed in the advisory. The CVSS v3.1 score is 6.4 (medium severity), reflecting that exploitation requires adjacent network access, low privileges, and no user interaction, but with high attack complexity. The impact is primarily on confidentiality and integrity, with no effect on availability. No public exploits are known, but the flaw clarifies a subtle semantic issue in Vert.x context duplication that could be leveraged in multi-tenant or multi-transaction environments. The patch fixes the context duplication logic to prevent data leakage. Organizations using Quarkus in microservices or cloud-native applications should prioritize upgrading to the fixed versions and review their usage of context duplication to avoid inadvertent data exposure.

Potential Impact

For European organizations, the vulnerability poses a risk of sensitive data leakage between transactions in Java applications built on vulnerable Quarkus versions. This can lead to unauthorized disclosure of confidential information such as user credentials, session data, or transaction metadata, potentially violating GDPR and other data protection regulations. The integrity of transaction data may also be compromised, undermining trust in application correctness. Industries with high security requirements—such as finance, healthcare, government, and critical infrastructure—are particularly vulnerable due to the sensitive nature of their data and regulatory scrutiny. The vulnerability could be exploited in multi-tenant cloud environments or containerized deployments common in European enterprises, increasing the attack surface. Although no availability impact is noted, the confidentiality breach alone can result in significant reputational damage, regulatory fines, and operational disruption. The medium severity rating suggests a moderate but actionable threat, especially in environments where context duplication is used extensively or improperly.

Mitigation Recommendations

1. Upgrade all Quarkus deployments to versions 3.24.1, 3.20.2, or 3.15.6 or later, where the vulnerability is patched. 2. Conduct a thorough code review to identify and eliminate unnecessary or improper duplication of duplicated Vert.x contexts, minimizing the risk of data leakage. 3. Implement strict access controls and network segmentation to limit the ability of attackers to gain adjacent network access required for exploitation. 4. Monitor application logs and telemetry for unusual context duplication patterns or unexpected data flows between transactions. 5. Apply runtime application self-protection (RASP) or security instrumentation to detect and block anomalous context propagation behaviors. 6. Educate developers on secure use of Vert.x contexts and the implications of context duplication in multi-tenant or concurrent transaction scenarios. 7. For containerized environments, ensure that container isolation and security best practices are enforced to reduce lateral movement risks. 8. Maintain an up-to-date inventory of Quarkus versions in use across the organization to prioritize patching efforts effectively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-06T15:44:21.555Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6859b1fea220c77d4f670a24

Added to database: 6/23/2025, 7:58:54 PM

Last enriched: 12/22/2025, 7:54:13 PM

Last updated: 1/7/2026, 6:11:56 AM

Views: 223

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats