Quarkus Data Leak via Duplicate Context before 3.24.0
CVE-2025-49574 Published on June 23, 2025
Quarkus potential data leak when duplicating a duplicated context
Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. In versions prior to 3.24.1, 3.20.2, and 3.15.6, there is a potential data leak when duplicating a duplicated context. Quarkus extensively uses the Vert.x duplicated context to implement context propagation. With the new semantic data from one transaction can leak to the data from another transaction. From a Vert.x point of view, this new semantic clarifies the behavior. A significant amount of data is stored in the duplicated context, including request scope, security details, and metadata. Duplicating a duplicated context is rather rare and is only done in a few places. This issue has been patched in version 3.24.1, 3.20.2, and 3.15.6.
Vulnerability Analysis
Weakness Type
Exposure of Resource to Wrong Sphere
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.
Products Associated with CVE-2025-49574
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2025-49574 are published in Red Hat Kafka:
Affected Versions
quarkusio quarkus:- Version >= 3.21.0.CR1, < 3.24.1 is affected.
- Version >= 3.16.0.CR1, < 3.20.2 is affected.
- Version < 3.15.6 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.