CVE-2025-12543
Published Jan 7, 2026
Last updated a month ago
- Description
- A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests.As a result, requests containing malformed or malicious Host headers are processed without rejection, enabling attackers to poison caches, perform internal network scans, or hijack user sessions.
- Source
- secalert@redhat.com
- NVD status
- Modified
- Products
- build_of_apache_camel, data_grid, fuse, jboss_enterprise_application_platform, jboss_enterprise_application_platform_expansion_pack, process_automation, single_sign-on, undertow
CVSS 3.1
- Type
- Primary
- Base score
- 9.6
- Impact score
- 6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- secalert@redhat.com
- CWE-20
- Hype score
- Not currently trending
HPE Telco Service Activator の脆弱性 CVE-2025-12543 が FIX:リモートアクセス制限回避の恐れ https://t.co/jzPdNDcxvf 通信事業者のネットワーク自動化を支える中核システム HPE Telco Service Activatorに、未認証のリモート攻撃者
@iototsecnews
2 Mar 2026
240 Impressions
2 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
⚠️ Vulnerabilidad en productos HPE ❗ CVE-2025-12543 ➡️ Más info: https://t.co/2KQdYCLUFS https://t.co/wnrrXnVPHb
@CERTpy
25 Feb 2026
95 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CRITICAL] Critical Flaw in HPE Telco Service Activator Exposed CVE-2025-12543 allows remote access control bypass; HPE urges updates. CVE: CVE-2025-12543 … https://t.co/tUOR2W8DOw
@MysocAi
25 Feb 2026
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[HIGH] CVE-2025-12543 in HPE Telco Service Activator HPE discovers critical vulnerability in Telco Service Activator affecting access controls. CVE: CVE-20… https://t.co/tUOR2W8DOw
@MysocAi
24 Feb 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[HIGH] Critical Vulnerability in HPE Telco Service Activator CVE-2025-12543 in HPE Telco Service Activator allows remote access control bypass; patch available. CVE: CVE-2025-12543 • APT: N/A • Status: ACTIVE Una… https://t.co/UDnQDYQasT
@MysocAi
24 Feb 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[HIGH] HPE Telco Service Activator Vulnerability CVE-2025-12543 allows remote access control bypass in HPE Telco Service Activator. CVE: CVE-2025-12543 • A… https://t.co/tUOR2W8DOw
@MysocAi
24 Feb 2026
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[HIGH] CVE-2025-12543 in HPE Telco Service Activator Allows Remote Access Critical flaw in HPE Telco Service Activator enables unauthorized remote acces… https://t.co/U4T1PjCeXk
@MysocAi
24 Feb 2026
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical HPE Telco Service Activator Bug Lets Attackers Bypass Access Controls via Host-Header Abuse (CVE-2025-12543) HPE disclosed CVE-2025-12543 (CVSS 9.6) in Telco Service Activator where Undertow fails to properly validate the HTTP Host header, enabling remote access
@ThreatSynop
24 Feb 2026
57 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
[CRITICAL] CVE-2025-12543: Critical Flaw in HPE Telco Service Activator HPE discovers CVE-2025-12543, a critical flaw allowing remote access control byp… https://t.co/U4T1PjCeXk
@MysocAi
24 Feb 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CRITICAL] Critical Vulnerability in HPE Telco Service Activator Discovered HPE identifies CVE-2025-12543, a critical flaw allowing remote access contro… https://t.co/U4T1PjCeXk
@MysocAi
24 Feb 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[HIGH] CISA Issues Emergency Patches for Critical Vulnerabilities CISA releases patches for critical flaws in multiple platforms. CVE: CVE-2026-1731, CVE-2025-12543 • APT: Unknown • Status: ACTIVE Urgent action needed t… https://t.co/J2iNIRDDMh
@MysocAi
24 Feb 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔶 [HIGH] CISA Warns of Active Exploitation of HPE Telco Service Activator Flaw CISA issues warning … 🔴 CVE: CVE-2025-12543 🕵️ APT: Unknown ⚡ Status: ACTIVE 🎯 MITRE: Initial Access, Exploitation for Privilege Escalation ⚔️ Requires immediate patching to prev
@MysocAi
24 Feb 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical HPE Telco Service Activator Flaw (CVE-2025-12543) Lets Attackers Bypass Host-Based Access Controls HPE warns a critical improper Host-header validation bug in the Undertow HTTP core used by Telco Service Activator can let remote attackers bypass access restrictions
@ThreatSynop
23 Feb 2026
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
通信事業者のサービス開通を担うHPE Service Activatorに深刻な脆弱性(CVE-2025-12543)が見つかった。CVSS9.6の高危険度で、内部ネットワーク侵害の恐れがある。 原因は内部で使用されるUndertow
@yousukezan
23 Feb 2026
3478 Impressions
2 Retweets
21 Likes
7 Bookmarks
0 Replies
0 Quotes
Critical Undertow HTTP server flaw CVE-2025-12543 (CVSS 9.6) impacts HPE Telco Service Activator, allowing cache poisoning and session hijacking. Patch now. #HPESA #CVE202512543 #CyberSecurity #TelecomSecurity #Undertow #CachePoisoning #InfoSec https://t.co/jUoi3Bzl6u
@the_yellow_fall
23 Feb 2026
151 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
#VulnerabilityReport #CachePoisoning The 9.6 Crack in Java’s Foundation: Critical Undertow Flaw CVE-2025-12543 https://t.co/FqqAdHAsDg
@Komodosec
13 Feb 2026
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
https://t.co/MRPSLkLbYA CVE-2025-12543: Host Header Validation Bypass in Undertow
@BentleyAudrey
23 Jan 2026
438 Impressions
3 Retweets
3 Likes
1 Bookmark
0 Replies
0 Quotes
Java、Undertow HTTPサーバにおけるHostヘッダ検証不備の脆弱性(CVE-2025-12543) https://t.co/VrREFdhTJ3 #セキュリティ対策Lab #セキュリティ #Security
@securityLab_jp
13 Jan 2026
148 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-12543: The Undertow Hijack Flaw Threatening WildFly and JBoss Infrastructure Read the full report on - https://t.co/wuxlNWYTEU https://t.co/6E607TgzOA
@cyberbivash
10 Jan 2026
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Undertow HTTP server core (io.undertow:undertow-core) has a #CRITICAL vulnerability, CVE-2025-12543, due to improper Host header validation. #WebSecurity #Vulnerability https://t.co/6RiSLa4J7t
@pulsepatchio
9 Jan 2026
76 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Undertow HTTP server has a critical Host header validation flaw (CVE-2025-12543). Impacts #Java applications like WildFly/JBoss EAP. Requires attention to prevent malformed request processing. #infosec #vulnerability https://t.co/uDxQQ5BVUx
@pulsepatchio
9 Jan 2026
61 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical host header validation flaw affects the Undertow HTTP server (CVE-2025-12543). Improper header handling may lead to security bypasses. Implement input validation. #Undertow #HTTPsecurity #CVE https://t.co/6RiSLa4J7t
@pulsepatchio
9 Jan 2026
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical Undertow Host-Header Bug (CVE-2025-12543) Enables Session Hijack & Cache Poisoning A critical Undertow core flaw (CVSS 9.6) fails to properly validate HTTP Host headers, letting remote attackers trigger cache poisoning, internal network scanning, and session hij
@ThreatSynop
9 Jan 2026
65 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
🚨 Critical Undertow Host-Header Flaw (CVE-2025-12543) Enables Session Hijack & Cache Poisoning in Java Apps A critical Undertow issue caused by improper validation of HTTP Host headers can be exploited remotely (no auth) to enable session hijacking, cache poisoning, and in
@ThreatSynop
9 Jan 2026
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-12543: CRITICAL] Critical security flaw in Undertow HTTP server core used in WildFly & JBoss EAP allows attackers to poison caches, perform network scans, or hijack user sessions. #cybersecurity#cve,CVE-2025-12543,#cybersecurity https://t.co/zmLmQ76XTo https://t.co/
@CveFindCom
7 Jan 2026
89 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔴 CVE-2025-12543 - Critical A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate the Host header in inc... https://t.co/DSyYdb9594 https://t.co/pqwdSgc96L
@TheHackerWire
7 Jan 2026
74 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-12543 A flaw was found in the Undertow HTTP server core, which is used in WildFly, JBoss EAP, and other Java applications. The Undertow library fails to properly validate t… https://t.co/gTQo3U4Y59
@CVEnew
7 Jan 2026
127 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:build_of_apache_camel:*:*:*:*:*:spring_boot:*:*",
"matchCriteriaId": "07091FB7-A140-4D8E-BDB8-1EC9CF463F53",
"versionEndExcluding": "4.14.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:data_grid:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7095200A-4DAC-4433-99E8-86CA88E1E4D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:fuse:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AAD91726-93D9-4230-BF69-6A79B58E09E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D2DF1E8-9000-4FB5-9EA8-138D8FB3E2CA",
"versionEndExcluding": "8.0.12",
"versionStartIncluding": "8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47585EEB-2EB2-42D6-B06E-290BCE788A9F",
"versionEndExcluding": "8.1.3",
"versionStartIncluding": "8.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*",
"matchCriteriaId": "B8423D7F-3A8F-4AD8-BF51-245C9D8DD816",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "72A54BDA-311C-413B-8E4D-388AD65A170A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform_expansion_pack:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0A24CBFB-4900-47A5-88D2-A44C929603DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20A6B40D-F991-4712-8E30-5FE008505CB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9EFEC7CA-8DDA-48A6-A7B6-1F1D14792890",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD2DF681-F91C-41CD-8031-1A0ABC2EF051",
"versionEndExcluding": "2.2.39",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:undertow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F2313BE-DB2E-4F91-9F8D-6428B276037A",
"versionEndExcluding": "2.3.21",
"versionStartIncluding": "2.3.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]