CVE-2023-41080: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Apache Software Foundation Apache Tomcat
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. Older, EOL versions may also be affected. The vulnerability is limited to the ROOT (default) web application.
AI Analysis
Technical Summary
CVE-2023-41080 is a security vulnerability classified as CWE-601 (Open Redirect) found in the FORM authentication mechanism of Apache Tomcat, a widely used Java-based web server and servlet container. This vulnerability affects Apache Tomcat versions from 8.5.0 through 8.5.92, 9.0.0-M1 through 9.0.79, 10.1.0-M1 through 10.0.12, and 11.0.0-M1 through 11.0.0-M10. The issue is confined to the ROOT (default) web application, where the FORM authentication feature improperly handles redirect URLs after login. An attacker can craft a URL that causes the server to redirect users to an arbitrary, untrusted external site. This can be exploited to facilitate phishing attacks by luring users to malicious websites that appear to be legitimate due to the initial trusted domain. The vulnerability does not require authentication or user interaction beyond clicking a malicious link, making it relatively straightforward to exploit. No public exploit code or active exploitation has been reported to date. The lack of a CVSS score indicates that the vulnerability's impact is recognized but not fully quantified yet. The vulnerability primarily threatens user trust and confidentiality by enabling redirection to potentially harmful sites, but it does not directly compromise server integrity or availability. Older, end-of-life versions of Apache Tomcat may also be affected, increasing the risk for organizations that have not maintained up-to-date software. Since Apache Tomcat is widely deployed in enterprise environments, especially for hosting Java web applications, this vulnerability could have broad implications if not addressed.
Potential Impact
For European organizations, the impact of CVE-2023-41080 centers on the risk of phishing and social engineering attacks leveraging trusted domains to redirect users to malicious sites. This can lead to credential theft, malware infection, or unauthorized data disclosure if users are deceived into entering sensitive information on attacker-controlled sites. The vulnerability undermines user trust in web applications hosted on affected Apache Tomcat servers. While it does not directly compromise server confidentiality, integrity, or availability, the indirect consequences can be significant, especially for sectors handling sensitive personal or financial data such as banking, healthcare, and government services. Organizations relying on the ROOT web application or custom applications built on affected Tomcat versions are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits in the future. The vulnerability also poses reputational risks if exploited, potentially leading to regulatory scrutiny under GDPR for failure to protect user data and prevent phishing attacks. European organizations with large user bases or public-facing web services should prioritize mitigation to prevent exploitation.
Mitigation Recommendations
1. Upgrade Apache Tomcat to the latest patched version as soon as it becomes available to ensure the vulnerability is fully addressed. 2. Until patches are applied, implement strict validation and sanitization of redirect URLs within the FORM authentication flow to ensure only trusted internal URLs are accepted. 3. Employ web application firewalls (WAFs) with rules designed to detect and block suspicious redirect patterns targeting the ROOT web application. 4. Educate users and administrators about the risks of phishing attacks leveraging open redirects and encourage vigilance when clicking on links, especially those received via email or untrusted sources. 5. Review and audit all web applications hosted on Apache Tomcat servers to identify any custom redirect logic that could be exploited similarly. 6. Monitor web server logs for unusual redirect requests or patterns indicative of exploitation attempts. 7. Consider implementing Content Security Policy (CSP) headers and other browser-based protections to reduce the impact of malicious redirects. 8. For organizations using older, unsupported Tomcat versions, plan and execute an upgrade strategy to supported releases to reduce exposure to this and other vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2023-41080: CWE-601 URL Redirection to Untrusted Site ('Open Redirect') in Apache Software Foundation Apache Tomcat
Description
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. Older, EOL versions may also be affected. The vulnerability is limited to the ROOT (default) web application.
AI-Powered Analysis
Technical Analysis
CVE-2023-41080 is a security vulnerability classified as CWE-601 (Open Redirect) found in the FORM authentication mechanism of Apache Tomcat, a widely used Java-based web server and servlet container. This vulnerability affects Apache Tomcat versions from 8.5.0 through 8.5.92, 9.0.0-M1 through 9.0.79, 10.1.0-M1 through 10.0.12, and 11.0.0-M1 through 11.0.0-M10. The issue is confined to the ROOT (default) web application, where the FORM authentication feature improperly handles redirect URLs after login. An attacker can craft a URL that causes the server to redirect users to an arbitrary, untrusted external site. This can be exploited to facilitate phishing attacks by luring users to malicious websites that appear to be legitimate due to the initial trusted domain. The vulnerability does not require authentication or user interaction beyond clicking a malicious link, making it relatively straightforward to exploit. No public exploit code or active exploitation has been reported to date. The lack of a CVSS score indicates that the vulnerability's impact is recognized but not fully quantified yet. The vulnerability primarily threatens user trust and confidentiality by enabling redirection to potentially harmful sites, but it does not directly compromise server integrity or availability. Older, end-of-life versions of Apache Tomcat may also be affected, increasing the risk for organizations that have not maintained up-to-date software. Since Apache Tomcat is widely deployed in enterprise environments, especially for hosting Java web applications, this vulnerability could have broad implications if not addressed.
Potential Impact
For European organizations, the impact of CVE-2023-41080 centers on the risk of phishing and social engineering attacks leveraging trusted domains to redirect users to malicious sites. This can lead to credential theft, malware infection, or unauthorized data disclosure if users are deceived into entering sensitive information on attacker-controlled sites. The vulnerability undermines user trust in web applications hosted on affected Apache Tomcat servers. While it does not directly compromise server confidentiality, integrity, or availability, the indirect consequences can be significant, especially for sectors handling sensitive personal or financial data such as banking, healthcare, and government services. Organizations relying on the ROOT web application or custom applications built on affected Tomcat versions are particularly vulnerable. The absence of known exploits reduces immediate risk but does not eliminate the threat, as attackers may develop exploits in the future. The vulnerability also poses reputational risks if exploited, potentially leading to regulatory scrutiny under GDPR for failure to protect user data and prevent phishing attacks. European organizations with large user bases or public-facing web services should prioritize mitigation to prevent exploitation.
Mitigation Recommendations
1. Upgrade Apache Tomcat to the latest patched version as soon as it becomes available to ensure the vulnerability is fully addressed. 2. Until patches are applied, implement strict validation and sanitization of redirect URLs within the FORM authentication flow to ensure only trusted internal URLs are accepted. 3. Employ web application firewalls (WAFs) with rules designed to detect and block suspicious redirect patterns targeting the ROOT web application. 4. Educate users and administrators about the risks of phishing attacks leveraging open redirects and encourage vigilance when clicking on links, especially those received via email or untrusted sources. 5. Review and audit all web applications hosted on Apache Tomcat servers to identify any custom redirect logic that could be exploited similarly. 6. Monitor web server logs for unusual redirect requests or patterns indicative of exploitation attempts. 7. Consider implementing Content Security Policy (CSP) headers and other browser-based protections to reduce the impact of malicious redirects. 8. For organizations using older, unsupported Tomcat versions, plan and execute an upgrade strategy to supported releases to reduce exposure to this and other vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2023-08-22T18:21:35.140Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 690204523aaa02566521b4d7
Added to database: 10/29/2025, 12:10:58 PM
Last enriched: 10/29/2025, 12:23:12 PM
Last updated: 11/6/2025, 1:34:59 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-5651: Improper Control of Generation of Code ('Code Injection')
HighCVE-2024-57520: n/a
CriticalCVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumCVE-2025-10259: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation MELSEC iQ-F Series FX5U-32MT/ES
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.