Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31651: CWE-116 Improper Encoding or Escaping of Output in Apache Software Foundation Apache Tomcat

0
Critical
VulnerabilityCVE-2025-31651cvecve-2025-31651cwe-116
Published: Mon Apr 28 2025 (04/28/2025, 19:17:21 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a subset of unlikely rewrite rule configurations, it was possible for a specially crafted request to bypass some rewrite rules. If those rewrite rules effectively enforced security constraints, those constraints could be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.5, from 10.1.0-M1 through 10.1.39, from 9.0.0.M1 through 9.0.102. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:22:11 UTC

Technical Analysis

CVE-2025-31651 is a critical security vulnerability identified in the Apache Software Foundation's Apache Tomcat server, affecting multiple versions from 8.5.0 through 11.0.5. The vulnerability stems from improper neutralization of escape, meta, or control sequences (CWE-116) within a subset of rewrite rule configurations. Specifically, certain specially crafted HTTP requests can bypass these rewrite rules, which are often used to enforce security constraints such as access controls or URL filtering. This bypass effectively allows an attacker to circumvent protections that rely on these rewrite rules, potentially exposing sensitive resources or enabling unauthorized actions. The flaw affects a broad range of Tomcat versions, including those currently maintained and some end-of-life versions, increasing the scope of vulnerable deployments. The vulnerability does not require authentication or user interaction, and the attack vector is network-based, making exploitation feasible remotely. The CVSS v3.1 base score is 9.8, reflecting the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no privileges required. Although no public exploits have been reported yet, the severity and nature of the vulnerability make it a prime target for attackers once exploit code becomes available. The recommended remediation is to upgrade to patched versions of Apache Tomcat once released. Until then, administrators should audit and tighten rewrite rule configurations to minimize risk. This vulnerability underscores the importance of secure configuration and timely patching in widely deployed web server software.

Potential Impact

The impact of CVE-2025-31651 is severe and far-reaching for organizations worldwide using Apache Tomcat as their web server or application container. Successful exploitation can lead to bypassing critical security constraints, potentially exposing sensitive data, enabling unauthorized access, or allowing attackers to manipulate application behavior. This compromises confidentiality, integrity, and availability of hosted applications and data. Given Apache Tomcat's widespread use in enterprise, government, and cloud environments, the vulnerability could facilitate large-scale breaches, data leaks, or service disruptions. Attackers could leverage this flaw to pivot within networks, escalate privileges, or deploy further malware. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks once exploit code is available. Organizations relying on rewrite rules for security enforcement are particularly at risk, as their protections may be nullified. The vulnerability also poses risks to critical infrastructure and services that depend on Apache Tomcat, potentially impacting national security and economic stability in affected regions.

Mitigation Recommendations

To mitigate CVE-2025-31651, organizations should prioritize upgrading Apache Tomcat to the fixed versions as soon as they are released by the Apache Software Foundation. Until patches are available, administrators should conduct a thorough audit of all rewrite rule configurations to identify and remediate any that could be bypassed by crafted requests. This includes tightening rule patterns, avoiding overly permissive or complex rewrites, and implementing additional access controls at the application or network layer. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious request patterns targeting rewrite rules can provide interim protection. Monitoring logs for anomalous requests that may indicate attempts to exploit this vulnerability is also recommended. Network segmentation and limiting exposure of Tomcat servers to untrusted networks can reduce attack surface. Finally, organizations should prepare incident response plans specific to this vulnerability to rapidly address any exploitation attempts once patches are deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-03-31T12:25:25.164Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981bc4522896dcbd9e21

Added to database: 5/21/2025, 9:08:43 AM

Last enriched: 2/26/2026, 9:22:11 PM

Last updated: 3/26/2026, 8:12:27 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses