banner logoJoin us at RSAC™ 2026 Conference, March 23–March 26 | North Expo, Booth N-5863Join us at RSAC™ 2026, March 23–March 26Learn More
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-12543

CVE-2025-12543: Redhat Apache Camel SSRF Vulnerability

CVE-2025-12543 is an SSRF flaw in Redhat Build Of Apache Camel affecting the Undertow HTTP server core. Attackers can poison caches, scan internal networks, or hijack sessions. Read about affected versions and fixes.

Updated: March 12, 2026

CVE-2025-12543 Overview

A critical improper input validation vulnerability has been discovered in the Undertow HTTP server core, which serves as the underlying HTTP server for WildFly, JBoss EAP, and numerous other Java-based enterprise applications. The Undertow library fails to properly validate the Host header in incoming HTTP requests, allowing requests containing malformed or malicious Host headers to be processed without rejection. This vulnerability enables attackers to poison caches, perform internal network scans, or hijack user sessions.

Critical Impact

Attackers can exploit improper Host header validation to perform cache poisoning attacks, conduct server-side request forgery (SSRF) for internal network reconnaissance, and hijack user sessions across multiple Red Hat enterprise products.

Affected Products

  • Red Hat Undertow
  • Red Hat JBoss Enterprise Application Platform (EAP)
  • Red Hat JBoss Enterprise Application Platform Expansion Pack
  • Red Hat Build of Apache Camel (Spring Boot)
  • Red Hat Data Grid 8.0
  • Red Hat Fuse 7.0.0
  • Red Hat Process Automation 7.0
  • Red Hat Single Sign-On 7.0

Discovery Timeline

  • January 7, 2026 - CVE-2025-12543 published to NVD
  • March 10, 2026 - Last updated in NVD database

Technical Details for CVE-2025-12543

Vulnerability Analysis

This vulnerability stems from CWE-20 (Improper Input Validation) in the Undertow HTTP server's request handling mechanism. The core issue lies in the insufficient validation of the HTTP Host header, which is a critical component used by web applications for routing decisions, virtual host selection, and generating absolute URLs.

When the Undertow server receives an HTTP request, it processes the Host header value without proper sanitization or validation. This allows attackers to inject arbitrary values, including internal hostnames, IP addresses, or specially crafted strings designed to manipulate application behavior. The vulnerability is particularly dangerous because it can be exploited remotely without authentication, and successful exploitation can affect other users through the changed scope of the attack.

The impact extends beyond simple header manipulation—attackers can leverage this flaw to poison web caches with malicious content that gets served to legitimate users, perform reconnaissance of internal network infrastructure through server-side request forgery, and in worst-case scenarios, hijack authenticated user sessions by manipulating how the application generates URLs and cookies.

Root Cause

The root cause is improper input validation (CWE-20) in the Undertow HTTP server's Host header parsing logic. The server accepts and processes Host header values without verifying that they conform to expected formats or belong to the set of valid hostnames configured for the application. This missing validation allows attackers to supply arbitrary values that are then used in security-sensitive operations such as URL generation, routing, and cache key computation.

Attack Vector

The attack is conducted over the network by sending crafted HTTP requests to vulnerable Undertow-based applications. An attacker can manipulate the Host header to:

  1. Cache Poisoning: Inject a malicious Host header that causes cached responses to be associated with attacker-controlled content
  2. Internal Network Scanning: Use the Host header to trigger server-side requests to internal IP addresses and services
  3. Session Hijacking: Manipulate cookie domains and redirect URLs to capture user credentials or session tokens

The attack requires user interaction (such as clicking a malicious link or visiting a compromised page) but requires no authentication, making it accessible to any network-based attacker.

The vulnerability manifests when the Undertow server parses incoming HTTP requests. An attacker sends a request with a crafted Host header containing malicious values such as internal IP addresses, localhost references, or attacker-controlled domains. The server processes these values without validation and uses them in subsequent operations. For detailed technical analysis, see the Red Hat Bug Report #2408784 and the Red Hat CVE Analysis.

Detection Methods for CVE-2025-12543

Indicators of Compromise

  • HTTP access logs containing unusual Host header values such as internal IP addresses (127.0.0.1, 192.168.x.x, 10.x.x.x) or unexpected domain names
  • Cache entries with mismatched Host headers compared to legitimate application domains
  • Unexpected outbound connections from application servers to internal network ranges
  • User session anomalies indicating potential session hijacking or cookie manipulation

Detection Strategies

  • Implement web application firewall (WAF) rules to inspect and validate Host headers against a whitelist of known legitimate hostnames
  • Configure network intrusion detection systems (IDS) to alert on HTTP requests containing private IP addresses or localhost in the Host header
  • Enable detailed HTTP access logging and implement log analysis rules to detect anomalous Host header patterns
  • Deploy application-level monitoring to track cache key generation and flag any unexpected variations

Monitoring Recommendations

  • Review HTTP access logs regularly for requests with Host headers that don't match configured virtual hosts
  • Monitor outbound network connections from Java application servers for unexpected internal network access patterns
  • Set up alerts for cache purge operations or unusually high cache miss rates that may indicate poisoning attempts
  • Track authentication and session creation events for anomalies that could indicate session hijacking

How to Mitigate CVE-2025-12543

Immediate Actions Required

  • Inventory all deployments using Undertow, WildFly, JBoss EAP, or other affected Red Hat products
  • Apply the appropriate security patches from Red Hat security advisories immediately
  • Implement Host header validation at the web application firewall or reverse proxy level as a defense-in-depth measure
  • Review application logs for any evidence of prior exploitation attempts

Patch Information

Red Hat has released security patches addressing this vulnerability across multiple product lines. Organizations should apply the relevant patches based on their deployed products:

  • Red Hat Security Advisory RHSA-2026:0383
  • Red Hat Security Advisory RHSA-2026:0384
  • Red Hat Security Advisory RHSA-2026:0386
  • Red Hat Security Advisory RHSA-2026:3889
  • Red Hat Security Advisory RHSA-2026:3890
  • Red Hat Security Advisory RHSA-2026:3891
  • Red Hat Security Advisory RHSA-2026:3892

For detailed CVE information and patch instructions, refer to the Red Hat CVE Analysis for CVE-2025-12543.

Workarounds

  • Deploy a reverse proxy (such as Apache HTTP Server or nginx) in front of Undertow-based applications and configure strict Host header validation
  • Implement application-level Host header validation to reject requests with unexpected or malformed values
  • Configure network segmentation to limit the impact of potential SSRF attacks originating from compromised application servers
  • Disable or restrict caching mechanisms until patches can be applied to prevent cache poisoning attacks
bash
# Example nginx configuration for Host header validation
# Add to server block to restrict allowed Host headers
if ($host !~* ^(allowed-domain\.com|www\.allowed-domain\.com)$) {
    return 444;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSSRF

  • Vendor/TechUndertow

  • SeverityCRITICAL

  • CVSS Score9.6

  • EPSS Probability0.21%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-20
  • Vendor Resources
  • Red Hat Security Advisory RHSA-2026:0383

  • Red Hat Security Advisory RHSA-2026:0384

  • Red Hat Security Advisory RHSA-2026:0386

  • Red Hat Security Advisory RHSA-2026:3889

  • Red Hat Security Advisory RHSA-2026:3890

  • Red Hat Security Advisory RHSA-2026:3891

  • Red Hat Security Advisory RHSA-2026:3892

  • Red Hat CVE Analysis CVE-2025-12543

  • Red Hat Bug Report #2408784
  • Related CVEs
  • CVE-2024-4027: Undertow DoS Vulnerability via Parameters

  • CVE-2023-4639: Undertow Cookie Parsing Vulnerability

  • CVE-2024-6162: Undertow AJP Listener DoS Vulnerability

  • CVE-2024-5971: Undertow Denial of Service Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use