CVE-2025-1948
Java vulnerability analysis and mitigation

Overview

In Eclipse Jetty versions 12.0.0 to 12.0.16, a critical vulnerability (CVE-2025-1948) was identified where an HTTP/2 client can specify an extremely large value for the HTTP/2 settings parameter SETTINGSMAXHEADERLISTSIZE. This vulnerability was discovered and disclosed on May 8, 2025, affecting the Jetty HTTP/2 server component (Eclipse Advisory, CVE Details).

Technical details

The vulnerability stems from the Jetty HTTP/2 server's failure to validate the SETTINGSMAXHEADERLISTSIZE parameter. When a client specifies a large value, the server attempts to allocate a ByteBuffer of the specified capacity to encode HTTP responses. The vulnerability has been assigned CWE-400 (Uncontrolled Resource Consumption) and received a CVSS v3.1 score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (Eclipse Advisory, CVE Assignment).

Impact

The exploitation of this vulnerability can result in OutOfMemoryError being thrown or, in more severe cases, cause the JVM process to exit completely. This can lead to service disruption and potential denial of service conditions for affected Jetty servers (Eclipse Advisory).

Mitigation and workarounds

The vulnerability has been patched in Eclipse Jetty version 12.0.17. No workarounds are available for affected versions, making upgrading to the patched version the only solution (Eclipse Advisory).

Community reactions

The vulnerability was initially reported by Bjørn Seime from Vespa.ai, highlighting the collaborative security research efforts within the Java ecosystem (Eclipse Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management