Apache Tomcat vulnerabilities
235 known vulnerabilities affecting apache/tomcat.
Total CVEs
235
CISA KEV
6
actively exploited
Public exploits
50
Exploited in wild
5
Severity breakdown
CRITICAL13HIGH74MEDIUM133LOW15
Vulnerabilities
Page 1 of 12
CVE-2025-66614CRITICALCVSS 9.1≥ 9.0.1, < 9.0.113≥ 10.1.1, < 10.1.50+4 more2026-02-17
CVE-2025-66614 [CRITICAL] CWE-20 CVE-2025-66614: Improper Input Validation vulnerability.
This issue affects Apache Tomcat: from 11.0.0-M1 through 1
Improper Input Validation vulnerability.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected.
Tomcat did not validate
nvd
CVE-2026-24734HIGHCVSS 7.5≥ 9.0.83, < 9.0.115≥ 10.1.1, < 10.1.52+3 more2026-02-17
CVE-2026-24734 [HIGH] CWE-20 CVE-2026-24734: Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat.
When using an OCSP
Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat.
When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.
This issue affects Apache Tomcat Native: from 1.3.0
nvd
CVE-2026-24733LOWCVSS 3.7≥ 9.0.1, < 9.0.113≥ 10.1.1, < 10.1.50+4 more2026-02-17
CVE-2026-24733 [LOW] CWE-20 CVE-2026-24733: Improper Input Validation vulnerability in Apache Tomcat.
Tomcat did not limit HTTP/0.9 requests t
Improper Input Validation vulnerability in Apache Tomcat.
Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
constraint was configured to allow HEAD requests to a URI but deny GET
requests, the user could bypass that constraint on GET requests by
sending a (specification invalid) HEAD request using HTTP/0.9.
This issue affects A
nvd
CVE-2025-55754CRITICALCVSS 9.6≥ 8.5.60, ≤ 8.5.100≥ 9.0.40, < 9.0.109+3 more2025-10-27
CVE-2025-55754 [CRITICAL] CWE-150 CVE-2025-55754: Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.
Tomca
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.
Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI
nvd
CVE-2025-55752HIGHCVSS 7.5≥ 8.5.6, ≤ 8.5.100≥ 9.0.1, < 9.0.109+4 more2025-10-27
CVE-2025-55752 [HIGH] CWE-23 CVE-2025-55752: Relative Path Traversal vulnerability in Apache Tomcat.
The fix for bug 60013 introduced a regressi
Relative Path Traversal vulnerability in Apache Tomcat.
The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the p
nvd
CVE-2025-61795MEDIUMCVSS 5.3≥ 8.5.0, ≤ 8.5.100≥ 9.0.0, < 9.0.110+3 more2025-10-27
CVE-2025-61795 [MEDIUM] CWE-404 CVE-2025-61795: Improper Resource Shutdown or Release vulnerability in Apache Tomcat.
If an error occurred (includi
Improper Resource Shutdown or Release vulnerability in Apache Tomcat.
If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memo
nvd
CVE-2025-48989HIGHCVSS 7.5≥ 9.0.1, < 9.0.108≥ 10.0.0, < 10.1.44+2 more2025-08-13
CVE-2025-48989 [HIGH] CWE-404 CVE-2025-48989: Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the m
Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected.
Users are recommended to upgrade to one of versions 11.0
nvd
CVE-2025-55668MEDIUMCVSS 6.5≥ 9.0.1, < 9.0.106≥ 10.0.0, < 10.1.42+2 more2025-08-13
CVE-2025-55668 [MEDIUM] CWE-384 CVE-2025-55668: Session Fixation vulnerability in Apache Tomcat via rewrite valve.
This issue affects Apache Tomcat
Session Fixation vulnerability in Apache Tomcat via rewrite valve.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.
Older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
nvd
CVE-2025-52520HIGHCVSS 7.5≥ 9.0.0, < 9.0.107≥ 10.1.0, < 10.1.43+1 more2025-07-10
CVE-2025-52520 [HIGH] CWE-190 CVE-2025-52520: For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache To
For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache Tomcat could lead to a DoS via bypassing of size limits.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106.
The following versions were EOL at the time the CVE was created but a
nvd
CVE-2025-53506HIGHCVSS 7.5≥ 9.0.0, ≤ 9.0.106≥ 10.1.0, ≤ 10.1.42+1 more2025-07-10
CVE-2025-53506 [HIGH] CWE-400 CVE-2025-53506: Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowl
Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106.
The following versions were EOL at th
nvd
CVE-2025-52434HIGHCVSS 7.5≥ 9.0.0, < 9.0.1072025-07-10
CVE-2025-52434 [HIGH] CWE-362 CVE-2025-52434: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerab
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in Apache Tomcat when using the APR/Native connector. This was particularly noticeable with client initiated closes of HTTP/2 connections.
This issue affects Apache Tomcat: from 9.0.0.M1 through 9.0.106.
The following versions were EOL at the tim
nvd
CVE-2025-48988HIGHCVSS 7.5≥ 9.0.0, < 9.0.106≥ 10.1.0, < 10.1.42+1 more2025-06-16
CVE-2025-48988 [HIGH] CWE-770 CVE-2025-48988: Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.
This issue aff
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versi
nvd
CVE-2025-49125HIGHCVSS 7.5≥ 9.0.0, < 9.0.106≥ 10.1.0, < 10.1.42+1 more2025-06-16
CVE-2025-49125 [HIGH] CWE-288 CVE-2025-49125: Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using
Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowi
nvd
CVE-2025-49124HIGHCVSS 8.4≥ 9.0.23, < 9.0.106≥ 10.1.0, < 10.1.42+1 more2025-06-16
CVE-2025-49124 [HIGH] CWE-426 CVE-2025-49124: Untrusted Search Path vulnerability in Apache Tomcat installer for Windows. During installation, the
Untrusted Search Path vulnerability in Apache Tomcat installer for Windows. During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0 through 10.1.41, from 9.0.23 through 9.0.105.
The following versions were EOL at the time the CVE
nvd
CVE-2025-46701HIGHCVSS 7.3≥ 9.0.0, < 9.0.105≥ 10.1.0, < 10.1.41+1 more2025-05-29
CVE-2025-46701 [HIGH] CWE-178 CVE-2025-46701: Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security c
Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104.
The follow
nvd
CVE-2025-31651CRITICALCVSS 9.8≥ 9.0.0, < 9.0.104≥ 10.1.0, < 10.1.40+1 more2025-04-28
CVE-2025-31651 [CRITICAL] CWE-116 CVE-2025-31651: Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a subset of unlikely rewrite rule configurations, it was possible
for a specially crafted request to bypass some rewrite rules. If those
rewrite rules effectively enforced security constraints, those
constraints could be bypassed.
This issue affects A
nvd
CVE-2025-31650HIGHCVSS 7.5PoC≥ 9.0.76, < 9.0.104≥ 10.1.10, < 10.1.40+2 more2025-04-28
CVE-2025-31650 [HIGH] CWE-459 CVE-2025-31650: Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.
This issue affects Apache Tomcat: from 9.0.7
nvd
CVE-2025-24813CRITICALCVSS 9.8KEVPoCfixed in 9.0.99≥ 10.1.1, < 10.1.35+3 more2025-03-10
CVE-2025-24813 [CRITICAL] CWE-44 CVE-2025-24813: Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information dis
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.
The following
nvd
CVE-2024-56337CRITICALCVSS 9.8≥ 9.0.0, < 9.0.98≥ 10.1.0, < 10.1.34+1 more2024-12-20
CVE-2024-56337 [CRITICAL] CVE-2024-56337: Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.
This issue affect
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions
may
nvd
CVE-2024-50379CRITICALCVSS 9.8≥ 9.0.0, < 9.0.98≥ 10.1.0, < 10.1.34+1 more2024-12-17
CVE-2024-50379 [CRITICAL] CWE-367 CVE-2024-50379: Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tom
Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.
nvd
1 / 12Next →