We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49574

Quarkus potential data leak when duplicating a duplicated context



Description

Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. In versions prior to 3.24.0, there is a potential data leak when duplicating a duplicated context. Quarkus extensively uses the Vert.x duplicated context to implement context propagation. With the new semantic data from one transaction can leak to the data from another transaction. From a Vert.x point of view, this new semantic clarifies the behavior. A significant amount of data is stored in the duplicated context, including request scope, security details, and metadata. Duplicating a duplicated context is rather rare and is only done in a few places. This issue has been patched in version 3.24.0.

Reserved 2025-06-06 | Published 2025-06-23 | Updated 2025-06-23 | Assigner GitHub_M


MEDIUM: 6.4CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N

Problem types

CWE-668: Exposure of Resource to Wrong Sphere

Product status

< 3.24.0
affected

References

github.com/...uarkus/security/advisories/GHSA-9623-mj7j-p9v4

github.com/quarkusio/quarkus/issues/48227

github.com/...ommit/2b58f59f4bf0bae7d35b1abb585b65f2a66787d1

cve.org (CVE-2025-49574)

nvd.nist.gov (CVE-2025-49574)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49574

Support options

Helpdesk Chat, Email, Knowledgebase