CVE-2025-49574: CWE-668: Exposure of Resource to Wrong Sphere in quarkusio quarkus
Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. In versions prior to 3.24.1, 3.20.2, and 3.15.6, there is a potential data leak when duplicating a duplicated context. Quarkus extensively uses the Vert.x duplicated context to implement context propagation. With the new semantic data from one transaction can leak to the data from another transaction. From a Vert.x point of view, this new semantic clarifies the behavior. A significant amount of data is stored in the duplicated context, including request scope, security details, and metadata. Duplicating a duplicated context is rather rare and is only done in a few places. This issue has been patched in version 3.24.1, 3.20.2, and 3.15.6.
AI Analysis
Technical Summary
CVE-2025-49574 is a vulnerability in the Quarkus framework, a cloud-native, container-first Java framework that leverages Vert.x for context propagation. The issue arises when a duplicated Vert.x context is duplicated again, a rare but possible operation in Quarkus. This leads to exposure of sensitive data stored within the duplicated context, including request scope information, security credentials, and metadata, across transaction boundaries. Essentially, data from one transaction can leak into another, violating isolation principles and potentially exposing confidential information to unauthorized transactions. The vulnerability affects Quarkus versions prior to 3.24.1, 3.20.2, and 3.15.6, with specific version ranges detailed in the advisory. The CVSS v3.1 score is 6.4 (medium severity), reflecting that exploitation requires adjacent network access, low privileges, and no user interaction, but with high attack complexity. The impact is primarily on confidentiality and integrity, with no effect on availability. No public exploits are known, but the flaw clarifies a subtle semantic issue in Vert.x context duplication that could be leveraged in multi-tenant or multi-transaction environments. The patch fixes the context duplication logic to prevent data leakage. Organizations using Quarkus in microservices or cloud-native applications should prioritize upgrading to the fixed versions and review their usage of context duplication to avoid inadvertent data exposure.
Potential Impact
For European organizations, the vulnerability poses a risk of sensitive data leakage between transactions in Java applications built on vulnerable Quarkus versions. This can lead to unauthorized disclosure of confidential information such as user credentials, session data, or transaction metadata, potentially violating GDPR and other data protection regulations. The integrity of transaction data may also be compromised, undermining trust in application correctness. Industries with high security requirements—such as finance, healthcare, government, and critical infrastructure—are particularly vulnerable due to the sensitive nature of their data and regulatory scrutiny. The vulnerability could be exploited in multi-tenant cloud environments or containerized deployments common in European enterprises, increasing the attack surface. Although no availability impact is noted, the confidentiality breach alone can result in significant reputational damage, regulatory fines, and operational disruption. The medium severity rating suggests a moderate but actionable threat, especially in environments where context duplication is used extensively or improperly.
Mitigation Recommendations
1. Upgrade all Quarkus deployments to versions 3.24.1, 3.20.2, or 3.15.6 or later, where the vulnerability is patched. 2. Conduct a thorough code review to identify and eliminate unnecessary or improper duplication of duplicated Vert.x contexts, minimizing the risk of data leakage. 3. Implement strict access controls and network segmentation to limit the ability of attackers to gain adjacent network access required for exploitation. 4. Monitor application logs and telemetry for unusual context duplication patterns or unexpected data flows between transactions. 5. Apply runtime application self-protection (RASP) or security instrumentation to detect and block anomalous context propagation behaviors. 6. Educate developers on secure use of Vert.x contexts and the implications of context duplication in multi-tenant or concurrent transaction scenarios. 7. For containerized environments, ensure that container isolation and security best practices are enforced to reduce lateral movement risks. 8. Maintain an up-to-date inventory of Quarkus versions in use across the organization to prioritize patching efforts effectively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-49574: CWE-668: Exposure of Resource to Wrong Sphere in quarkusio quarkus
Description
Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. In versions prior to 3.24.1, 3.20.2, and 3.15.6, there is a potential data leak when duplicating a duplicated context. Quarkus extensively uses the Vert.x duplicated context to implement context propagation. With the new semantic data from one transaction can leak to the data from another transaction. From a Vert.x point of view, this new semantic clarifies the behavior. A significant amount of data is stored in the duplicated context, including request scope, security details, and metadata. Duplicating a duplicated context is rather rare and is only done in a few places. This issue has been patched in version 3.24.1, 3.20.2, and 3.15.6.
AI-Powered Analysis
Technical Analysis
CVE-2025-49574 is a vulnerability in the Quarkus framework, a cloud-native, container-first Java framework that leverages Vert.x for context propagation. The issue arises when a duplicated Vert.x context is duplicated again, a rare but possible operation in Quarkus. This leads to exposure of sensitive data stored within the duplicated context, including request scope information, security credentials, and metadata, across transaction boundaries. Essentially, data from one transaction can leak into another, violating isolation principles and potentially exposing confidential information to unauthorized transactions. The vulnerability affects Quarkus versions prior to 3.24.1, 3.20.2, and 3.15.6, with specific version ranges detailed in the advisory. The CVSS v3.1 score is 6.4 (medium severity), reflecting that exploitation requires adjacent network access, low privileges, and no user interaction, but with high attack complexity. The impact is primarily on confidentiality and integrity, with no effect on availability. No public exploits are known, but the flaw clarifies a subtle semantic issue in Vert.x context duplication that could be leveraged in multi-tenant or multi-transaction environments. The patch fixes the context duplication logic to prevent data leakage. Organizations using Quarkus in microservices or cloud-native applications should prioritize upgrading to the fixed versions and review their usage of context duplication to avoid inadvertent data exposure.
Potential Impact
For European organizations, the vulnerability poses a risk of sensitive data leakage between transactions in Java applications built on vulnerable Quarkus versions. This can lead to unauthorized disclosure of confidential information such as user credentials, session data, or transaction metadata, potentially violating GDPR and other data protection regulations. The integrity of transaction data may also be compromised, undermining trust in application correctness. Industries with high security requirements—such as finance, healthcare, government, and critical infrastructure—are particularly vulnerable due to the sensitive nature of their data and regulatory scrutiny. The vulnerability could be exploited in multi-tenant cloud environments or containerized deployments common in European enterprises, increasing the attack surface. Although no availability impact is noted, the confidentiality breach alone can result in significant reputational damage, regulatory fines, and operational disruption. The medium severity rating suggests a moderate but actionable threat, especially in environments where context duplication is used extensively or improperly.
Mitigation Recommendations
1. Upgrade all Quarkus deployments to versions 3.24.1, 3.20.2, or 3.15.6 or later, where the vulnerability is patched. 2. Conduct a thorough code review to identify and eliminate unnecessary or improper duplication of duplicated Vert.x contexts, minimizing the risk of data leakage. 3. Implement strict access controls and network segmentation to limit the ability of attackers to gain adjacent network access required for exploitation. 4. Monitor application logs and telemetry for unusual context duplication patterns or unexpected data flows between transactions. 5. Apply runtime application self-protection (RASP) or security instrumentation to detect and block anomalous context propagation behaviors. 6. Educate developers on secure use of Vert.x contexts and the implications of context duplication in multi-tenant or concurrent transaction scenarios. 7. For containerized environments, ensure that container isolation and security best practices are enforced to reduce lateral movement risks. 8. Maintain an up-to-date inventory of Quarkus versions in use across the organization to prioritize patching efforts effectively.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-06T15:44:21.555Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6859b1fea220c77d4f670a24
Added to database: 6/23/2025, 7:58:54 PM
Last enriched: 12/22/2025, 7:54:13 PM
Last updated: 1/7/2026, 6:11:56 AM
Views: 223
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.