Thanks to visit codestin.com
Credit goes to github.com

Skip to content

CVE-2025-66560 - io.quarkus/quarkus-rest: Quarkus REST Worker Thread Exhaustion Vulnerability #45570

@rmartinc

Description

@rmartinc

Before reporting an issue

  • I have read and understood the above terms for submitting issues, and I understand that my issue may be closed without action if I do not follow them.

Area

dist/quarkus

Describe the bug

Package: io.quarkus:quarkus-rest
Installed Version: 3.30.5
Vulnerability CVE-2025-66560
Severity: MEDIUM
Fixed Version: 3.20.5, 3.27.2, 3.31.0
Link: CVE-2025-66560

Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. Prior to versions 3.31.0, 3.27.2, and 3.20.5, a vulnerability exists in the HTTP layer of Quarkus REST related to response handling. When a response is being written, the framework waits for previously written response chunks to be fully transmitted before proceeding. If the client connection is dropped during this waiting period, the associated worker thread is never released and becomes permanently blocked. Under sustained or repeated occurrences, this can exhaust the available worker threads, leading to degraded performance, or complete unavailability of the application. This issue has been patched in versions 3.31.0, 3.27.2, and 3.20.5. A workaround involves implementing a health check that monitors the status and saturation of the worker thread pool to detect abnormal thread retention early.

Version

26.5.1

Regression

  • The issue is a regression

Expected behavior

No CVE reported.

Actual behavior

CVE reported.

How to Reproduce?

Please check the scanner alerts.

Anything else?

This seems to be fixed in quarkus but not in the next 3.30.6 (or it was a mistake in the advisory, we need to investigate this).

Metadata

Metadata

Assignees

No one assigned

    Type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions