Apache Software Foundation Apache Tomcat vulnerabilities

96 known vulnerabilities affecting apache_software_foundation/apache_tomcat.

Total CVEs
96
CISA KEV
5
actively exploited
Public exploits
12
Exploited in wild
4
Severity breakdown
CRITICAL15HIGH53MEDIUM26LOW2

Vulnerabilities

Page 1 of 5
CVE-2026-32990CRITICALCVSS 9.1≥ 11.0.15, ≤ 11.0.19≥ 10.1.50, ≤ 10.1.52+1 more2026-04-09
CVE-2026-32990 [CRITICAL] CWE-20 Apache Tomcat: Fix for CVE-2025-66614 is incomplete Apache Tomcat: Fix for CVE-2025-66614 is incomplete Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614. This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115. Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
cvelistv5
CVE-2026-29145CRITICALCVSS 9.1≥ 11.0.0-M1, ≤ 11.0.18≥ 10.1.0-M7, ≤ 10.1.52+1 more2026-04-09
CVE-2026-29145 CVE-2026-29145: CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled v CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0
cvelistv5nvd
CVE-2026-34487HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.20≥ 10.1.0-M1, ≤ 10.1.53+1 more2026-04-09
CVE-2026-34487 CWE-532 CVE-2026-34487: Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clusterin Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116. Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9
cvelistv5nvd
CVE-2026-34483HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.20≥ 10.1.0-M1, ≤ 10.1.53+2 more2026-04-09
CVE-2026-34483 CWE-116 CVE-2026-34483: Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116. Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 , which fix the issue.
cvelistv5nvd
CVE-2026-34486HIGHCVSS 7.5v11.0.20v10.1.53+1 more2026-04-09
CVE-2026-34486 [HIGH] CWE-311 CVE-2026-34486: Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to the fix for CVE-2026-2914 Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to the fix for CVE-2026-29146 allowing the bypass of the EncryptInterceptor. This issue affects Apache Tomcat: 11.0.20, 10.1.53, 9.0.116. Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.
cvelistv5nvd
CVE-2026-29146HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.18≥ 10.0.0-M1, ≤ 10.1.52+3 more2026-04-09
CVE-2026-29146 CVE-2026-29146: Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration. This Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109. Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes
cvelistv5nvd
CVE-2026-24880HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.18≥ 10.1.0-M1, ≤ 10.1.52+3 more2026-04-09
CVE-2026-24880 CWE-444 CVE-2026-24880: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Ap Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109. Other, unsupported versions may a
cvelistv5nvd
CVE-2026-29129HIGHCVSS 7.5≥ 11.0.16, ≤ 11.0.18≥ 10.1.51, ≤ 10.1.52+1 more2026-04-09
CVE-2026-29129 CVE-2026-29129: Configured cipher preference order not preserved vulnerability in Apache Tomcat. This issue affects Configured cipher preference order not preserved vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115. Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
cvelistv5nvd
CVE-2026-25854MEDIUMCVSS 6.1≥ 11.0.0-M1, ≤ 11.0.18≥ 10.1.0-M1, ≤ 10.1.52+2 more2026-04-09
CVE-2026-25854 CWE-601 CVE-2026-25854: Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via th Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100. Other, unsupported versions may also be affected Users are recommended
cvelistv5nvd
CVE-2026-34500MEDIUMCVSS 6.5≥ 11.0.0-M14, ≤ 11.0.20≥ 10.1.22, ≤ 10.1.53+1 more2026-04-09
CVE-2026-34500 CVE-2026-34500: CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled a CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22 through 10.1.53, from 9.0.92 through 9.0.116. Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fixes the issue.
cvelistv5nvd
CVE-2025-66614CRITICALCVSS 9.1≥ 11.0.15, ≤ 11.0.19≥ 10.1.50, ≤ 10.1.52+1 more2026-02-17
CVE-2025-66614 [CRITICAL] CWE-20 CVE-2025-66614: Improper Input Validation vulnerability. This issue affects Apache Tomcat: from 11.0.0-M1 through 1 Improper Input Validation vulnerability. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected. Tomcat did not validate
cvelistv5nvd
CVE-2026-24734HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.17≥ 10.1.0-M7, ≤ 10.1.51+1 more2026-02-17
CVE-2026-24734 [HIGH] CWE-20 CVE-2026-24734: Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed. This issue affects Apache Tomcat Native: from 1.3.0
cvelistv5nvd
CVE-2026-24733LOWCVSS 3.7≥ 11.0.0-M1, ≤ 11.0.14≥ 10.1.0-M1, ≤ 10.1.49+2 more2026-02-17
CVE-2026-24733 [LOW] CWE-20 CVE-2026-24733: Improper Input Validation vulnerability in Apache Tomcat. Tomcat did not limit HTTP/0.9 requests t Improper Input Validation vulnerability in Apache Tomcat. Tomcat did not limit HTTP/0.9 requests to the GET method. If a security constraint was configured to allow HEAD requests to a URI but deny GET requests, the user could bypass that constraint on GET requests by sending a (specification invalid) HEAD request using HTTP/0.9. This issue affects A
cvelistv5nvd
CVE-2025-55754CRITICALCVSS 9.6≥ 11.0.0-M1, ≤ 11.0.10≥ 10.1.0-M1, ≤ 10.1.44+2 more2025-10-27
CVE-2025-55754 [CRITICAL] CWE-150 CVE-2025-55754: Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomca Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI
cvelistv5nvd
CVE-2025-55752HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.10≥ 10.1.0-M1, ≤ 10.1.44+2 more2025-10-27
CVE-2025-55752 [HIGH] CWE-23 CVE-2025-55752: Relative Path Traversal vulnerability in Apache Tomcat. The fix for bug 60013 introduced a regressi Relative Path Traversal vulnerability in Apache Tomcat. The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the p
cvelistv5nvd
CVE-2025-61795MEDIUMCVSS 5.3≥ 11.0.0-M1, ≤ 11.0.11≥ 10.1.0-M1, ≤ 10.1.46+2 more2025-10-27
CVE-2025-61795 [MEDIUM] CWE-404 CVE-2025-61795: Improper Resource Shutdown or Release vulnerability in Apache Tomcat. If an error occurred (includi Improper Resource Shutdown or Release vulnerability in Apache Tomcat. If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memo
cvelistv5nvd
CVE-2025-48989HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.9≥ 10.1.0-M1, ≤ 10.1.43+1 more2025-08-13
CVE-2025-48989 [HIGH] CWE-404 CVE-2025-48989: Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the m Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected. Users are recommended to upgrade to one of versions 11.0
cvelistv5nvd
CVE-2025-55668MEDIUMCVSS 6.5≥ 11.0.0-M1, ≤ 11.0.7≥ 10.1.0-M1, ≤ 10.1.41+1 more2025-08-13
CVE-2025-55668 [MEDIUM] CWE-384 CVE-2025-55668: Session Fixation vulnerability in Apache Tomcat via rewrite valve. This issue affects Apache Tomcat Session Fixation vulnerability in Apache Tomcat via rewrite valve. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
cvelistv5nvd
CVE-2025-52520HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.8≥ 10.1.0-M1, ≤ 10.1.42+2 more2025-07-10
CVE-2025-52520 [HIGH] CWE-190 CVE-2025-52520: For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache To For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache Tomcat could lead to a DoS via bypassing of size limits. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but a
cvelistv5nvd
CVE-2025-53506HIGHCVSS 7.5≥ 11.0.0-M1, ≤ 11.0.8≥ 10.1.0-M1, ≤ 10.1.42+2 more2025-07-10
CVE-2025-53506 [HIGH] CWE-400 CVE-2025-53506: Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowl Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at th
cvelistv5nvd