A flaw was found in Quarkus REST that allows request parameters to leak between concurrent requests if endpoints use field injection without a CDI scope. This vulnerability allows attackers to manipulate request data, impersonate users, or access sensitive information.
Workaround:
The product does not sufficiently enforce boundaries between the states of different sessions, causing data to be provided to, or used by, the wrong session.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2025:1884 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:1885 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:2067 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2025-1247 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2345172 | issue tracking |