[CIVN-2025-0365] Multiple Vulnerabilities in Red Hat Jboss

By Published On: December 16, 2025

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in Red Hat Jboss 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
JBoss Enterprise Web Server 5 for RHEL 9 x86_64
JBoss Enterprise Web Server 5 for RHEL 8 x86_64
JBoss Enterprise Web Server 5 for RHEL 7 x86_64
JBoss Enterprise Web Server Text-Only Advisories x86_64
Overview
Multiple vulnerabilities have reported in Red Hat JBoss Web Server which could exploited by remote attacker to bypass security restriction, cause denial of service (DoS) condition and execute arbitrary code on the targeted system.
Target Audience:
Large-scale enterprises and organizations using Red Hat JBoss products.
Risk Assessment:
High risk of unauthorized access to sensitive data, system compromise.
Impact Assessment:
Potential for remote code execution, privilege escalation or service disruption.
Description
Red Hat JBoss is a Java-based server that provides a secure, scalable, and high-performance environment for developing, deploying, and managing enterprise applications.
Multiple vulnerabilities exist in Red Hat JBoss due to improper URL normalization during request rewriting, an implementation weakness in HTTP/2 stream reset handling and Improper Neutralization of Escape, Meta, or Control Sequences flaw. A remote attacker could exploit these vulnerabilities by sending a specially crafted request.
Successful exploitation of these vulnerabilities could allow a remote attacker to bypass security restriction, cause denial of service (DoS) condition and execute arbitrary code on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://access.redhat.com/errata/RHSA-2025:22924
https://access.redhat.com/errata/RHSA-2025:22925
Vendor Information
RedHat
https://access.redhat.com/errata/RHSA-2025:22924
https://access.redhat.com/errata/RHSA-2025:22925
References
 
https://access.redhat.com/errata/RHSA-2025:22924
https://access.redhat.com/errata/RHSA-2025:22925
CVE Name
CVE-2025-31651
CVE-2025-48989
CVE-2025-55752
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=5TWR
—–END PGP SIGNATURE—–

Share this article