Description

A flaw was found in Undertow. A remote attacker could exploit this vulnerability by sending an HTTP GET request containing multipart/form-data content. If the underlying application processes parameters using methods like `getParameterMap()`, the server prematurely parses and stores this content to disk. This could lead to resource exhaustion, potentially resulting in a Denial of Service (DoS).

INFO

Published Date :

2026-03-24T04:11:16.085Z

Last Modified :

2026-03-24T04:12:01.834Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2026-3260 vulnerability.

Vendors Products
Redhat
  • Apache Camel Hawtio
  • Build Of Apache Camel - Hawtio
  • Build Of Apache Camel For Spring Boot
  • Camel Spring Boot
  • Data Grid
  • Enterprise Linux
  • Fuse
  • Jboss Data Grid
  • Jboss Enterprise Application Platform
  • Jboss Enterprise Application Platform Expansion Pack
  • Jboss Enterprise Bpms Platform
  • Jboss Fuse
  • Jbosseapxp
  • Process Automation
  • Red Hat Single Sign On
  • Undertow
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-3260.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact