CVE-2025-66560: CWE-770: Allocation of Resources Without Limits or Throttling in quarkusio quarkus
Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. Prior to versions 3.31.0, 3.27.2, and 3.20.5, a vulnerability exists in the HTTP layer of Quarkus REST related to response handling. When a response is being written, the framework waits for previously written response chunks to be fully transmitted before proceeding. If the client connection is dropped during this waiting period, the associated worker thread is never released and becomes permanently blocked. Under sustained or repeated occurrences, this can exhaust the available worker threads, leading to degraded performance, or complete unavailability of the application. This issue has been patched in versions 3.31.0, 3.27.2, and 3.20.5. A workaround involves implementing a health check that monitors the status and saturation of the worker thread pool to detect abnormal thread retention early.
AI Analysis
Technical Summary
CVE-2025-66560 is a resource exhaustion vulnerability classified under CWE-770, affecting the Quarkus framework's HTTP response handling in versions prior to 3.31.0, 3.27.2, and 3.20.5. Quarkus is widely used for building cloud-native Java applications, often deployed in Linux container environments. The vulnerability occurs because when Quarkus writes HTTP responses, it waits for previously sent response chunks to be fully transmitted before proceeding. If a client connection drops during this wait, the worker thread handling that response does not get released and remains blocked indefinitely. Over time, repeated or sustained dropped connections can exhaust the pool of available worker threads. This exhaustion leads to degraded application performance or complete denial of service, as no threads remain to handle new requests. The vulnerability does not affect confidentiality or integrity but severely impacts availability. Exploitation is remote and unauthenticated but requires high attack complexity due to the need to repeatedly cause connection drops. The issue has been patched in Quarkus versions 3.31.0, 3.27.2, and 3.20.5. As a mitigation, implementing health checks that monitor the worker thread pool status can help detect abnormal thread retention early, allowing proactive response before service degradation occurs. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of applications built on the Quarkus framework, especially those deployed in cloud-native or containerized environments. Organizations relying on affected versions may experience degraded performance or complete outages if attackers or network conditions cause repeated client connection drops. This can disrupt critical business services, impact customer experience, and potentially lead to financial losses or reputational damage. The vulnerability does not compromise data confidentiality or integrity, but the denial of service impact can affect sectors with high availability requirements such as finance, healthcare, and public services. Given the growing adoption of Quarkus in Europe’s software development ecosystem, particularly in Germany, France, and the UK, the threat is relevant to a broad range of enterprises and public sector organizations. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially as attackers may develop techniques to trigger connection drops at scale.
Mitigation Recommendations
1. Upgrade all Quarkus deployments to versions 3.31.0, 3.27.2, or 3.20.5 or later where the vulnerability is patched. 2. Implement health checks that monitor the worker thread pool saturation and thread retention metrics to detect abnormal conditions early. 3. Configure application and infrastructure-level timeouts to minimize the duration worker threads remain blocked on dropped connections. 4. Employ network-level protections such as rate limiting and connection management to reduce the likelihood of sustained connection drops caused by malicious or unstable clients. 5. Use container orchestration health probes (e.g., Kubernetes readiness and liveness probes) to automatically restart unhealthy application instances exhibiting thread pool exhaustion. 6. Monitor application logs and metrics for signs of thread starvation or increased latency in response handling. 7. Educate development and operations teams about this vulnerability to ensure timely patching and monitoring. 8. Consider deploying Web Application Firewalls (WAFs) or API gateways that can help detect and mitigate abnormal client connection behaviors.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-66560: CWE-770: Allocation of Resources Without Limits or Throttling in quarkusio quarkus
Description
Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. Prior to versions 3.31.0, 3.27.2, and 3.20.5, a vulnerability exists in the HTTP layer of Quarkus REST related to response handling. When a response is being written, the framework waits for previously written response chunks to be fully transmitted before proceeding. If the client connection is dropped during this waiting period, the associated worker thread is never released and becomes permanently blocked. Under sustained or repeated occurrences, this can exhaust the available worker threads, leading to degraded performance, or complete unavailability of the application. This issue has been patched in versions 3.31.0, 3.27.2, and 3.20.5. A workaround involves implementing a health check that monitors the status and saturation of the worker thread pool to detect abnormal thread retention early.
AI-Powered Analysis
Technical Analysis
CVE-2025-66560 is a resource exhaustion vulnerability classified under CWE-770, affecting the Quarkus framework's HTTP response handling in versions prior to 3.31.0, 3.27.2, and 3.20.5. Quarkus is widely used for building cloud-native Java applications, often deployed in Linux container environments. The vulnerability occurs because when Quarkus writes HTTP responses, it waits for previously sent response chunks to be fully transmitted before proceeding. If a client connection drops during this wait, the worker thread handling that response does not get released and remains blocked indefinitely. Over time, repeated or sustained dropped connections can exhaust the pool of available worker threads. This exhaustion leads to degraded application performance or complete denial of service, as no threads remain to handle new requests. The vulnerability does not affect confidentiality or integrity but severely impacts availability. Exploitation is remote and unauthenticated but requires high attack complexity due to the need to repeatedly cause connection drops. The issue has been patched in Quarkus versions 3.31.0, 3.27.2, and 3.20.5. As a mitigation, implementing health checks that monitor the worker thread pool status can help detect abnormal thread retention early, allowing proactive response before service degradation occurs. No known exploits have been reported in the wild to date.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the availability of applications built on the Quarkus framework, especially those deployed in cloud-native or containerized environments. Organizations relying on affected versions may experience degraded performance or complete outages if attackers or network conditions cause repeated client connection drops. This can disrupt critical business services, impact customer experience, and potentially lead to financial losses or reputational damage. The vulnerability does not compromise data confidentiality or integrity, but the denial of service impact can affect sectors with high availability requirements such as finance, healthcare, and public services. Given the growing adoption of Quarkus in Europe’s software development ecosystem, particularly in Germany, France, and the UK, the threat is relevant to a broad range of enterprises and public sector organizations. The lack of known exploits reduces immediate risk but does not eliminate the potential for future attacks, especially as attackers may develop techniques to trigger connection drops at scale.
Mitigation Recommendations
1. Upgrade all Quarkus deployments to versions 3.31.0, 3.27.2, or 3.20.5 or later where the vulnerability is patched. 2. Implement health checks that monitor the worker thread pool saturation and thread retention metrics to detect abnormal conditions early. 3. Configure application and infrastructure-level timeouts to minimize the duration worker threads remain blocked on dropped connections. 4. Employ network-level protections such as rate limiting and connection management to reduce the likelihood of sustained connection drops caused by malicious or unstable clients. 5. Use container orchestration health probes (e.g., Kubernetes readiness and liveness probes) to automatically restart unhealthy application instances exhibiting thread pool exhaustion. 6. Monitor application logs and metrics for signs of thread starvation or increased latency in response handling. 7. Educate development and operations teams about this vulnerability to ensure timely patching and monitoring. 8. Consider deploying Web Application Firewalls (WAFs) or API gateways that can help detect and mitigate abnormal client connection behaviors.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-04T16:01:32.473Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e9b047349d0379db428c6
Added to database: 1/7/2026, 5:42:28 PM
Last enriched: 1/7/2026, 5:56:48 PM
Last updated: 1/9/2026, 1:05:57 AM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22714: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - Monaco Skin
LowCVE-2026-22710: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in The Wikimedia Foundation Mediawiki - Wikibase Extension
LowCVE-2026-0733: SQL Injection in PHPGurukul Online Course Registration System
MediumCVE-2026-0732: Command Injection in D-Link DI-8200G
MediumCVE-2026-0731: NULL Pointer Dereference in TOTOLINK WA1200
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.