Apache Software Foundation Apache Tomcat vulnerabilities
96 known vulnerabilities affecting apache_software_foundation/apache_tomcat.
Total CVEs
96
CISA KEV
5
actively exploited
Public exploits
12
Exploited in wild
4
Severity breakdown
CRITICAL15HIGH53MEDIUM26LOW2
Vulnerabilities
Page 1 of 5
CVE-2026-32990CRITICALCVSS 9.1≥ 11.0.15, ≤ 11.0.19≥ 10.1.50, ≤ 10.1.52+1 more2026-04-09
CVE-2026-32990 [CRITICAL] CWE-20 Apache Tomcat: Fix for CVE-2025-66614 is incomplete
Apache Tomcat: Fix for CVE-2025-66614 is incomplete
Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614.
This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115.
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
cvelistv5
CVE-2026-29145CRITICALCVSS 9.1≥ 11.0.0-M1, ≤ 11.0.18≥ 10.1.0-M7, ≤ 10.1.52+1 more2026-04-09
CVE-2026-29145 CVE-2026-29145: CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled v
CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0
cvelistv5nvd
CVE-2026-34487HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.20≥ 10.1.0-M1, ≤ 10.1.53+1 more2026-04-09
CVE-2026-34487 CWE-532 CVE-2026-34487: Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clusterin
Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9
cvelistv5nvd
CVE-2026-34483HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.20≥ 10.1.0-M1, ≤ 10.1.53+2 more2026-04-09
CVE-2026-34483 CWE-116 CVE-2026-34483: Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache
Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 , which fix the issue.
cvelistv5nvd
CVE-2026-34486HIGHCVSS 7.5v11.0.20v10.1.53+1 more2026-04-09
CVE-2026-34486 [HIGH] CWE-311 CVE-2026-34486: Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to the fix for CVE-2026-2914
Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to the fix for CVE-2026-29146 allowing the bypass of the EncryptInterceptor.
This issue affects Apache Tomcat: 11.0.20, 10.1.53, 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.
cvelistv5nvd
CVE-2026-29146HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.18≥ 10.0.0-M1, ≤ 10.1.52+3 more2026-04-09
CVE-2026-29146 CVE-2026-29146: Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.
This
Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.
Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes
cvelistv5nvd
CVE-2026-24880HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.18≥ 10.1.0-M1, ≤ 10.1.52+3 more2026-04-09
CVE-2026-24880 CWE-444 CVE-2026-24880: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Ap
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may a
cvelistv5nvd
CVE-2026-29129HIGHCVSS 7.5≥ 11.0.16, ≤ 11.0.18≥ 10.1.51, ≤ 10.1.52+1 more2026-04-09
CVE-2026-29129 CVE-2026-29129: Configured cipher preference order not preserved vulnerability in Apache Tomcat.
This issue affects
Configured cipher preference order not preserved vulnerability in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115.
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
cvelistv5nvd
CVE-2026-25854MEDIUMCVSS 6.1≥ 11.0.0-M1, ≤ 11.0.18≥ 10.1.0-M1, ≤ 10.1.52+2 more2026-04-09
CVE-2026-25854 CWE-601 CVE-2026-25854: Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via th
Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100.
Other, unsupported versions may also be affected
Users are recommended
cvelistv5nvd
CVE-2026-34500MEDIUMCVSS 6.5≥ 11.0.0-M14, ≤ 11.0.20≥ 10.1.22, ≤ 10.1.53+1 more2026-04-09
CVE-2026-34500 CVE-2026-34500: CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled a
CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22 through 10.1.53, from 9.0.92 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fixes the issue.
cvelistv5nvd
CVE-2025-66614CRITICALCVSS 9.1≥ 11.0.15, ≤ 11.0.19≥ 10.1.50, ≤ 10.1.52+1 more2026-02-17
CVE-2025-66614 [CRITICAL] CWE-20 CVE-2025-66614: Improper Input Validation vulnerability.
This issue affects Apache Tomcat: from 11.0.0-M1 through 1
Improper Input Validation vulnerability.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected.
Tomcat did not validate
cvelistv5nvd
CVE-2026-24734HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.17≥ 10.1.0-M7, ≤ 10.1.51+1 more2026-02-17
CVE-2026-24734 [HIGH] CWE-20 CVE-2026-24734: Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat.
When using an OCSP
Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat.
When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.
This issue affects Apache Tomcat Native: from 1.3.0
cvelistv5nvd
CVE-2026-24733LOWCVSS 3.7≥ 11.0.0-M1, ≤ 11.0.14≥ 10.1.0-M1, ≤ 10.1.49+2 more2026-02-17
CVE-2026-24733 [LOW] CWE-20 CVE-2026-24733: Improper Input Validation vulnerability in Apache Tomcat.
Tomcat did not limit HTTP/0.9 requests t
Improper Input Validation vulnerability in Apache Tomcat.
Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
constraint was configured to allow HEAD requests to a URI but deny GET
requests, the user could bypass that constraint on GET requests by
sending a (specification invalid) HEAD request using HTTP/0.9.
This issue affects A
cvelistv5nvd
CVE-2025-55754CRITICALCVSS 9.6≥ 11.0.0-M1, ≤ 11.0.10≥ 10.1.0-M1, ≤ 10.1.44+2 more2025-10-27
CVE-2025-55754 [CRITICAL] CWE-150 CVE-2025-55754: Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.
Tomca
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.
Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI
cvelistv5nvd
CVE-2025-55752HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.10≥ 10.1.0-M1, ≤ 10.1.44+2 more2025-10-27
CVE-2025-55752 [HIGH] CWE-23 CVE-2025-55752: Relative Path Traversal vulnerability in Apache Tomcat.
The fix for bug 60013 introduced a regressi
Relative Path Traversal vulnerability in Apache Tomcat.
The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the p
cvelistv5nvd
CVE-2025-61795MEDIUMCVSS 5.3≥ 11.0.0-M1, ≤ 11.0.11≥ 10.1.0-M1, ≤ 10.1.46+2 more2025-10-27
CVE-2025-61795 [MEDIUM] CWE-404 CVE-2025-61795: Improper Resource Shutdown or Release vulnerability in Apache Tomcat.
If an error occurred (includi
Improper Resource Shutdown or Release vulnerability in Apache Tomcat.
If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memo
cvelistv5nvd
CVE-2025-48989HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.9≥ 10.1.0-M1, ≤ 10.1.43+1 more2025-08-13
CVE-2025-48989 [HIGH] CWE-404 CVE-2025-48989: Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the m
Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected.
Users are recommended to upgrade to one of versions 11.0
cvelistv5nvd
CVE-2025-55668MEDIUMCVSS 6.5≥ 11.0.0-M1, ≤ 11.0.7≥ 10.1.0-M1, ≤ 10.1.41+1 more2025-08-13
CVE-2025-55668 [MEDIUM] CWE-384 CVE-2025-55668: Session Fixation vulnerability in Apache Tomcat via rewrite valve.
This issue affects Apache Tomcat
Session Fixation vulnerability in Apache Tomcat via rewrite valve.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.
Older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
cvelistv5nvd
CVE-2025-52520HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.8≥ 10.1.0-M1, ≤ 10.1.42+2 more2025-07-10
CVE-2025-52520 [HIGH] CWE-190 CVE-2025-52520: For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache To
For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache Tomcat could lead to a DoS via bypassing of size limits.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106.
The following versions were EOL at the time the CVE was created but a
cvelistv5nvd
CVE-2025-53506HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.8≥ 10.1.0-M1, ≤ 10.1.42+2 more2025-07-10
CVE-2025-53506 [HIGH] CWE-400 CVE-2025-53506: Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowl
Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106.
The following versions were EOL at th
cvelistv5nvd
1 / 5Next →