A foundational crack has been discovered in the bedrock of the Java web ecosystem. Undertow, the high-performance web server that powers enterprise heavyweights like WildFly and JBoss EAP, has been hit with a critical security vulnerability. Tracked as CVE-2025-12543, this flaw allows attackers to weaponize the HTTP Host header, opening the door to cache poisoning, internal reconnaissance, and session hijacking.
With a blistering CVSS score of 9.6, the vulnerability is rated “Critical,” signaling an immediate threat to organizations relying on this versatile server for everything from reverse proxying to WebSocket handling.
The vulnerability lies in how the Undertow core processes incoming web traffic. In a standard HTTP request, the Host header tells the server which website the client is trying to reach. It acts as a routing label.
However, CVE-2025-12543 reveals that Undertow fails to properly validate this header. Instead of rejecting malformed or malicious Host inputs, the server processes them without question. This oversight effectively allows an attacker to lie to the server about where a request is going—or where it came from.
The implications of this “Host Header Injection” are severe and multifaceted. By slipping a malicious Host header past the guards, attackers can execute a range of devastating maneuvers:
- Cache Poisoning: Attackers can trick the server (or downstream caches) into serving malicious content to legitimate users. Imagine a user requesting a safe login page but receiving a poisoned version because the cache was corrupted by a spoofed Host header.
- Internal Network Scans: The flaw can be abused to perform Server-Side Request Forgery (SSRF)-style attacks, probing the victim’s internal network to map out hidden services that should never be visible to the outside world.
- Session Hijacking: By manipulating how links are generated or how the server perceives the user’s session, attackers can steal credentials and hijack accounts.
Security researchers warn that this flaw is remotely exploitable without authentication, meaning an attacker needs no prior access to launch an assault.
While the severity is classified as “Important” due to the requirement for limited user interaction to achieve full impact (such as tricking a user into clicking a poisoned link), the sheer potential for damage drives the CVSS score to near-maximum levels. The vulnerability strikes directly at the Confidentiality and Integrity of the affected systems.
Because Undertow is designed to be embeddable, it rarely sits alone. It is the default web server for WildFly (formerly JBoss AS) and JBoss Enterprise Application Platform (EAP), meaning this vulnerability likely permeates thousands of enterprise Java applications globally.
Administrators running Undertow, WildFly, or JBoss EAP are urged to check for vendor patches immediately. The primary fix involves implementing strict validation logic to ensure that only expected and well-formed Host headers are processed by the server.