CVE-2022-2466
Java vulnerability analysis and mitigation

Overview

A vulnerability was identified in Quarkus versions 2.10.x where HTTP request header context is not properly terminated, leading to potential security issues. The vulnerability is tracked as CVE-2022-2466 and affects the request context handling in Quarkus applications (Quarkus Issue, CVE Mitre).

Technical details

The vulnerability manifests when accessing RoutingContext request from a bean in Quarkus 2.10.x applications. The issue causes the headers of the first request to persist and be returned for all subsequent requests. This affects both @GraphQLAPI endpoints and any CDI bean that consumes RoutingContext or HttpServerRequest. The CurrentVertxRequest maintains stale headers, indicating a failure in proper request context termination (Quarkus Issue).

Impact

The vulnerability can lead to information leakage and security issues as subsequent requests may receive header information from previous requests, potentially exposing sensitive data such as authentication tokens or other security-related headers (Quarkus Issue).

Mitigation and workarounds

Users are advised to upgrade from Quarkus 2.10.x to a patched version. As a temporary workaround, users can downgrade to Quarkus 2.9.x where this issue is not present (Quarkus Issue).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55749HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-tool-jetty-resources
NoYesDec 01, 2025
CVE-2025-13806MEDIUM6.9
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-13805MEDIUM6.3
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-13804MEDIUM5.3
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-66372LOW2.8
  • JavaJava
  • org.mustangproject:library
NoYesNov 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management