CVE-2025-31650: CWE-459 Incomplete Cleanup in Apache Software Foundation Apache Tomcat
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.90 though 8.5.100. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.
AI Analysis
Technical Summary
CVE-2025-31650 is a high-severity vulnerability affecting multiple versions of Apache Tomcat, a widely used open-source Java Servlet Container developed by the Apache Software Foundation. The vulnerability is classified under CWE-459: Incomplete Cleanup, and arises due to improper input validation related to HTTP priority headers. Specifically, when Apache Tomcat processes certain invalid HTTP priority headers, the error handling mechanism fails to fully clean up resources associated with the failed request. This incomplete cleanup leads to a memory leak within the server process. If an attacker sends a large volume of such malformed requests, the accumulated memory leak can exhaust the Java Virtual Machine (JVM) heap space, triggering an OutOfMemoryException. This results in a denial of service (DoS) condition, where the Tomcat server becomes unresponsive or crashes, disrupting availability of hosted web applications. The affected versions include Apache Tomcat 9.0.76 through 9.0.102, 10.1.10 through 10.1.39, and 11.0.0-M2 through 11.0.5. Additionally, end-of-life versions 8.5.90 through 8.5.100 are also vulnerable. The vulnerability does not require authentication or user interaction, and can be exploited remotely over the network by sending crafted HTTP requests with invalid priority headers. The CVSS v3.1 base score is 7.5 (High), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability (no confidentiality or integrity impact). The Apache Software Foundation has addressed this issue in Apache Tomcat versions 9.0.104, 10.1.40, and 11.0.6. Users are strongly advised to upgrade to these fixed versions to mitigate the risk. No known exploits are reported in the wild at the time of publication, but the straightforward nature of the attack and the criticality of availability for web services make this a significant threat. In summary, CVE-2025-31650 is a remotely exploitable denial of service vulnerability caused by incomplete cleanup of failed HTTP requests with invalid priority headers in Apache Tomcat, affecting multiple actively maintained versions and some EOL versions, with a high potential impact on service availability.
Potential Impact
For European organizations, the impact of CVE-2025-31650 can be substantial, particularly for those relying on Apache Tomcat to host critical web applications, internal portals, or APIs. The vulnerability enables an attacker to cause a denial of service by exhausting server memory, leading to service outages. This can disrupt business operations, customer-facing services, and internal workflows. Sectors such as finance, healthcare, government, and e-commerce, which often depend on Tomcat-based applications, may experience operational downtime, reputational damage, and potential regulatory scrutiny due to service unavailability. Given the vulnerability does not compromise confidentiality or integrity, the primary concern is availability, which is crucial for compliance with EU regulations like the NIS Directive that mandate operational continuity for essential services. Additionally, the ease of exploitation without authentication increases the risk of opportunistic attacks or automated scanning campaigns targeting vulnerable Tomcat instances. Organizations with public-facing Tomcat servers are particularly at risk. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score indicates that attackers could develop exploits rapidly.
Mitigation Recommendations
To mitigate CVE-2025-31650 effectively, European organizations should: 1. Upgrade Apache Tomcat to the fixed versions: 9.0.104, 10.1.40, or 11.0.6 as soon as possible. This is the most reliable and direct mitigation. 2. Implement Web Application Firewalls (WAFs) or network-level filtering to detect and block HTTP requests with malformed or suspicious priority headers, reducing exposure to exploit attempts. 3. Monitor server logs and JVM metrics for unusual memory usage patterns or frequent OutOfMemoryExceptions that could indicate attempted exploitation. 4. Employ rate limiting on HTTP requests to prevent high volumes of malformed requests from overwhelming the server. 5. Conduct regular vulnerability scanning and penetration testing focused on HTTP header validation to identify vulnerable Tomcat instances. 6. For organizations unable to upgrade immediately, consider isolating vulnerable Tomcat servers behind reverse proxies that can sanitize HTTP headers or reject invalid priority headers. 7. Maintain an incident response plan to quickly address potential DoS incidents caused by this vulnerability. These steps go beyond generic advice by emphasizing specific controls around HTTP header validation, monitoring JVM health, and network-level protections tailored to the nature of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Poland, Belgium, Ireland
CVE-2025-31650: CWE-459 Incomplete Cleanup in Apache Software Foundation Apache Tomcat
Description
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.90 though 8.5.100. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-31650 is a high-severity vulnerability affecting multiple versions of Apache Tomcat, a widely used open-source Java Servlet Container developed by the Apache Software Foundation. The vulnerability is classified under CWE-459: Incomplete Cleanup, and arises due to improper input validation related to HTTP priority headers. Specifically, when Apache Tomcat processes certain invalid HTTP priority headers, the error handling mechanism fails to fully clean up resources associated with the failed request. This incomplete cleanup leads to a memory leak within the server process. If an attacker sends a large volume of such malformed requests, the accumulated memory leak can exhaust the Java Virtual Machine (JVM) heap space, triggering an OutOfMemoryException. This results in a denial of service (DoS) condition, where the Tomcat server becomes unresponsive or crashes, disrupting availability of hosted web applications. The affected versions include Apache Tomcat 9.0.76 through 9.0.102, 10.1.10 through 10.1.39, and 11.0.0-M2 through 11.0.5. Additionally, end-of-life versions 8.5.90 through 8.5.100 are also vulnerable. The vulnerability does not require authentication or user interaction, and can be exploited remotely over the network by sending crafted HTTP requests with invalid priority headers. The CVSS v3.1 base score is 7.5 (High), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and impact limited to availability (no confidentiality or integrity impact). The Apache Software Foundation has addressed this issue in Apache Tomcat versions 9.0.104, 10.1.40, and 11.0.6. Users are strongly advised to upgrade to these fixed versions to mitigate the risk. No known exploits are reported in the wild at the time of publication, but the straightforward nature of the attack and the criticality of availability for web services make this a significant threat. In summary, CVE-2025-31650 is a remotely exploitable denial of service vulnerability caused by incomplete cleanup of failed HTTP requests with invalid priority headers in Apache Tomcat, affecting multiple actively maintained versions and some EOL versions, with a high potential impact on service availability.
Potential Impact
For European organizations, the impact of CVE-2025-31650 can be substantial, particularly for those relying on Apache Tomcat to host critical web applications, internal portals, or APIs. The vulnerability enables an attacker to cause a denial of service by exhausting server memory, leading to service outages. This can disrupt business operations, customer-facing services, and internal workflows. Sectors such as finance, healthcare, government, and e-commerce, which often depend on Tomcat-based applications, may experience operational downtime, reputational damage, and potential regulatory scrutiny due to service unavailability. Given the vulnerability does not compromise confidentiality or integrity, the primary concern is availability, which is crucial for compliance with EU regulations like the NIS Directive that mandate operational continuity for essential services. Additionally, the ease of exploitation without authentication increases the risk of opportunistic attacks or automated scanning campaigns targeting vulnerable Tomcat instances. Organizations with public-facing Tomcat servers are particularly at risk. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score indicates that attackers could develop exploits rapidly.
Mitigation Recommendations
To mitigate CVE-2025-31650 effectively, European organizations should: 1. Upgrade Apache Tomcat to the fixed versions: 9.0.104, 10.1.40, or 11.0.6 as soon as possible. This is the most reliable and direct mitigation. 2. Implement Web Application Firewalls (WAFs) or network-level filtering to detect and block HTTP requests with malformed or suspicious priority headers, reducing exposure to exploit attempts. 3. Monitor server logs and JVM metrics for unusual memory usage patterns or frequent OutOfMemoryExceptions that could indicate attempted exploitation. 4. Employ rate limiting on HTTP requests to prevent high volumes of malformed requests from overwhelming the server. 5. Conduct regular vulnerability scanning and penetration testing focused on HTTP header validation to identify vulnerable Tomcat instances. 6. For organizations unable to upgrade immediately, consider isolating vulnerable Tomcat servers behind reverse proxies that can sanitize HTTP headers or reject invalid priority headers. 7. Maintain an incident response plan to quickly address potential DoS incidents caused by this vulnerability. These steps go beyond generic advice by emphasizing specific controls around HTTP header validation, monitoring JVM health, and network-level protections tailored to the nature of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-03-31T12:13:57.705Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981bc4522896dcbd9e72
Added to database: 5/21/2025, 9:08:43 AM
Last enriched: 8/15/2025, 1:19:41 AM
Last updated: 8/18/2025, 1:22:21 AM
Views: 21
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.