๐Ÿ” CVE Alert

CVE-2025-1247

HIGH 8.3

Io.quarkus:quarkus-rest: quarkus rest endpoint request parameter leakage due to shared instance

CVSS Score
8.3
EPSS Score
0.2%
EPSS Percentile
40th

A flaw was found in Quarkus REST that allows request parameters to leak between concurrent requests if endpoints use field injection without a CDI scope. This vulnerability allows attackers to manipulate request data, impersonate users, or access sensitive information.

CWE CWE-488
Published Feb 13, 2025
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
Low

Affected Versions

Red Hat / Red Hat Build of Apache Camel 4.8 for Quarkus 3.15
All versions affected
Red Hat / Red Hat build of Quarkus 3.15.3.SP1
All versions affected
Red Hat / Red Hat build of Quarkus 3.8.6.SP3
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1884 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:1885 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:2067 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-1247 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2345172 github.com: https://github.com/quarkusio/quarkus/issues/45789