CVSS Score: 3.7 Published: 2026-03-05 Full Report: https://cvereports.com/reports/CVE-2025-11143
A URI parsing vulnerability exists in Eclipse Jetty's HttpURI class where the parser's state machine deviates from RFC 3986 standards. This discrepancy leads to differential parsing issues, specifically regarding the prioritization of delimiters (such as #, ?, and @) and the validation of URI schemes. Attackers can leverage these inconsistencies to craft URIs that are interpreted differently by Jetty than by intermediary security devices (WAFs, load balancers), potentially leading to protection bypasses, host confusion, or Server-Side Request Forgery (SSRF) scenarios.
Eclipse Jetty incorrectly parses URIs containing specific delimiter combinations (e.g., # followed by @), allowing attackers to manipulate the perceived host or path. This 'parser differential' allows malicious requests to bypass upstream security filters.
- CWE ID: CWE-20
- Attack Vector: Network
- CVSS Score: 3.7 (Low)
- EPSS Score: 0.00043 (12.87%)
- Exploit Status: PoC Available
- KEV Status: Not Listed
- Eclipse Jetty 9.4.0 through 9.4.58
- Eclipse Jetty 10.0.0 through 10.0.26
- Eclipse Jetty 11.0.0 through 11.0.26
- Eclipse Jetty 12.0.0 through 12.0.30
- Eclipse Jetty 12.1.0 through 12.1.4
- Eclipse Jetty: 9.4.0 - 9.4.58 (Fixed in:
9.4.59) - Eclipse Jetty: 10.0.0 - 10.0.26 (Fixed in:
10.0.27) - Eclipse Jetty: 11.0.0 - 11.0.26 (Fixed in:
11.0.27) - Eclipse Jetty: 12.0.0 - 12.0.30 (Fixed in:
12.0.31) - Eclipse Jetty: 12.1.0 - 12.1.4 (Fixed in:
12.1.5)
- Update Eclipse Jetty to the latest patched version.
- Implement strict URI normalization at the reverse proxy level, ensuring requests are rejected if they contain ambiguous delimiter combinations.
- Configure WAF rules to detect and block URIs containing userinfo delimiters (
@) appearing after fragment (#) or query (?) markers.
Remediation Steps:
- Identify the version of Eclipse Jetty currently deployed (e.g., via
java -jar start.jar --versionor checking dependency trees). - Update the dependency to one of the fixed versions:
9.4.59,10.0.27,11.0.27,12.0.31, or12.1.5. - If using a standalone distribution, download the latest tarball/zip from the official Eclipse download page and migrate configuration files.
- Restart the Jetty service to apply the changes.
Generated by CVEReports - Automated Vulnerability Intelligence