SB2026021723 - Multiple vulnerabilities in JBoss Enterprise Application Platform 8.1 for RHEL 9 x86_64
Published: February 17, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Improper Neutralization of HTTP Headers for Scripting Syntax (CVE-ID: CVE-2025-12543)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to improper input validation when processing HTTP requests. A remote non-authenticated attacker can send a specially crafted HTTP request with an arbitrary Host header that will be accepted by the application.
Successful exploitation of the vulnerability may allow an attacker to perform cross-site scripting, cache poisoning or session hijacking attacks.
2) Resource exhaustion (CVE-ID: CVE-2025-23184)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources in CachedOutputStream instances allowing creation of enormous amount of temporary files. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
3) Resource exhaustion (CVE-ID: CVE-2025-9784)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources when handling HTTP/2 requests. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
The vulnerability was dubbed HTTP/2 Made You Reset Attack.
4) Resource exhaustion (CVE-ID: CVE-2024-3884)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources within the FormEncodedDataDefinition.doParse(StreamSourceChannel) method. A remote attacker can send a large form data encoding with application/x-www-form-urlencoded to trigger resource exhaustion and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.