Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Teams Vulnerability Enables Spoofing Attacks
May 13, 2026
Microsoft Patch Tuesday May 2026: Vulnerabilities Fixed
May 12, 2026
Critical Fortinet FortiSandbox Flaw Allows Vulnerability Enables
May 12, 2026
Home/CyberSecurity News/Undertow Java HTTP Server Flaw Lets Attackers Used Apps
CyberSecurity News

Undertow Java HTTP Server Flaw Lets Attackers Used Apps

A critical security vulnerability has emerged within the Undertow HTTP server core, a component widely integrated into Java HTTP Serversuch as WildFly and JBoss EAP. The vulnerability, tracked...

Marcus Rodriguez
Marcus Rodriguez
January 9, 2026 2 Min Read
15 0

A critical security vulnerability has emerged within the Undertow HTTP server core, a component widely integrated into Java HTTP Serversuch as WildFly and JBoss EAP.

The vulnerability, tracked as CVE-2025-12543, poses serious risks to application security by enabling attackers to hijack user sessions and compromise internal systems.

The flaw exists in how Undertow handles HTTP Host headers in incoming requests. The library fails to validate these headers properly, allowing malformed or malicious Host headers to pass through without rejection.

This weakness creates multiple attack vectors, including cache poisoning, internal network scanning, and session hijacking.

CVE ID CVE-2025-12543
CVSS Score 9.6 (Critical)
Severity Important
Attack Vector Network
CWE CWE-20 (Improper Input Validation)

Red Hat classified this vulnerability as having “Important” severity because it can be exploited remotely without authentication, though limited user interaction is required.

Successful exploitation could allow attackers to steal user credentials, hijack additional accounts, or gain unauthorized access to internal systems.

The vulnerability severely impacts both confidentiality and integrity of affected systems. Red Hat JBoss Enterprise Application Platform 8.1 and related components across multiple packages, including eap8-undertow, eap8-wildfly, and other associated libraries.

Red Hat has released security patches to address this vulnerability. Organizations using affected versions should immediately apply the available updates released on January 8, 2026, through security advisories RHSA-2026:0386 and RHSA-2026:0383.

Currently, no alternative mitigation options meet Red Hat’s security criteria for ease of use and stability, making immediate patching the recommended course of action.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

Microsoft Defender Blocks Legitimate MAS During Script Hunt

Next Post

Discover the 10 Best Bot Protection Software Solutions

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ivanti Patches Critical Vulnerabilities in Secure Access &
May 12, 2026
Open WebUI File Upload Vulnerability Allows 1 Leads Attack
May 12, 2026
SAP Patches Critical SQL Injection Flaw in S/4 Vulnerability S/4HANA
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us