CVE-2025-58056
Java vulnerability analysis and mitigation

Overview

Netty, an asynchronous event-driven network application framework, contains a vulnerability in versions 4.1.124.Final and 4.2.0.Alpha3 through 4.2.4.Final where it incorrectly accepts standalone newline characters (LF) as chunk-size line terminators in HTTP/1.1 chunked transfer encoding, regardless of a preceding carriage return (CR). This vulnerability was discovered in September 2025 and is tracked as CVE-2025-58056 (GitHub Advisory).

Technical details

The vulnerability stems from Netty's non-compliant parsing of chunk extensions in HTTP/1.1 messages with chunked encoding. When encountering a newline character (LF) while parsing a chunk extension, Netty interprets it as the end of the chunk-size line regardless of whether a preceding carriage return (CR) was found. This violates the HTTP/1.1 standard which requires CRLF sequence for chunk line termination (RFC 9112). The vulnerability has been assigned a CVSS v4.0 base score of 8.2 HIGH (GitHub Advisory).

Impact

When combined with reverse proxies that parse LF differently (treating it as part of the chunk extension), attackers can craft requests that the proxy sees as one request but Netty processes as two, enabling request smuggling attacks. This can be exploited to bypass front-end access control rules and potentially serve malicious responses to other live clients (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been fixed in versions 4.1.125.Final and 4.2.5.Final. Users should upgrade to these patched versions. The fix involves enforcing strict CR LF line separators for HTTP messages by default, though this can be configured through HttpDecoderConfig (GitHub Commit).

Community reactions

The vulnerability was initially reported by researcher @JeppW and coordinated by @JLLeitschuh at Socket. After the Netty team was initially unresponsive, the vulnerability was publicly disclosed on June 18, 2025, leading to increased attention from the security community (GitHub Issue).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-58365HIGH8.7
  • JavaJava
  • org.xwiki.contrib.blog:application-blog-ui
NoYesSep 08, 2025
CVE-2025-58369MEDIUM5.3
  • JavaJava
  • co.fs2:fs2-io_2.11
NoYesSep 05, 2025
GHSA-c7v7-rqfm-f44jMEDIUM5.3
  • JavaJava
  • com.vaadin:vaadin
NoYesSep 04, 2025
GHSA-94g8-xv23-7656MEDIUM5.3
  • JavaJava
  • com.vaadin:vaadin-upload-flow
NoYesSep 04, 2025
CVE-2025-9467MEDIUM5.3
  • JavaJava
  • com.vaadin:vaadin-server
NoYesSep 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management