CVE-2026-3260

Published Mar 24, 2026

Last updated 8 days ago

Overview

Description
A flaw was found in Undertow. A remote attacker could exploit this vulnerability by sending an HTTP GET request containing multipart/form-data content. If the underlying application processes parameters using methods like `getParameterMap()`, the server prematurely parses and stores this content to disk. This could lead to resource exhaustion, potentially resulting in a Denial of Service (DoS).
Source
secalert@redhat.com
NVD status
Analyzed
Products
build_of_apache_camel_-_hawtio, build_of_apache_camel_for_spring_boot, data_grid, fuse, jboss_enterprise_application_platform, jboss_enterprise_application_platform_expansion_pack, process_automation, single_sign-on, undertow, enterprise_linux

Risk scores

CVSS 3.1

Type
Primary
Base score
7.5
Impact score
3.6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Severity
HIGH

Weaknesses

secalert@redhat.com
CWE-770

Social media

Hype score
Not currently trending

Configurations