Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-48988: CWE-770 Allocation of Resources Without Limits or Throttling in Apache Software Foundation Apache Tomcat

0
High
VulnerabilityCVE-2025-48988cvecve-2025-48988cwe-770
Published: Mon Jun 16 2025 (06/16/2025, 14:13:40 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.

AI-Powered Analysis

AILast updated: 11/06/2025, 01:45:27 UTC

Technical Analysis

CVE-2025-48988 is a resource allocation vulnerability classified under CWE-770, affecting Apache Tomcat versions from 8.5.0 through 11.0.7, including some end-of-life versions. The flaw arises because Tomcat does not impose sufficient limits or throttling on resource allocation, allowing an attacker to consume excessive server resources such as memory, CPU, or threads. This can be triggered remotely without authentication or user interaction, making it a network-exploitable denial of service vector. The vulnerability impacts the availability of Tomcat servers by potentially causing crashes or severe performance degradation. Apache has addressed this issue in versions 11.0.8, 10.1.42, and 9.0.106 by introducing proper resource management and throttling mechanisms. Although no exploits have been observed in the wild yet, the vulnerability’s characteristics and CVSS score of 7.5 indicate a significant risk, especially for internet-facing Tomcat deployments. Organizations relying on Tomcat for critical web applications should prioritize upgrading and monitoring resource consumption to prevent exploitation.

Potential Impact

For European organizations, the primary impact is denial of service leading to downtime of web applications and services hosted on vulnerable Apache Tomcat servers. This can disrupt business operations, degrade customer experience, and potentially cause financial losses. Public sector entities, financial institutions, and large enterprises that rely heavily on Java-based web infrastructure are particularly vulnerable. The lack of authentication or user interaction required for exploitation increases the risk of automated attacks. Additionally, prolonged service outages could affect compliance with service-level agreements and regulatory requirements. The vulnerability could also be leveraged as part of a multi-stage attack to distract or exhaust defenses while other malicious activities occur. Organizations with limited patch management capabilities or legacy systems are at higher risk.

Mitigation Recommendations

1. Immediately upgrade Apache Tomcat to the fixed versions: 11.0.8, 10.1.42, or 9.0.106. 2. Implement resource usage monitoring and alerting on Tomcat servers to detect abnormal spikes in CPU, memory, or thread consumption. 3. Configure network-level protections such as rate limiting, web application firewalls (WAFs), and intrusion prevention systems (IPS) to limit the volume of requests to Tomcat services. 4. Review and tighten Tomcat connector and thread pool configurations to impose sensible limits on concurrent connections and resource allocation. 5. Conduct regular vulnerability scans and penetration tests focusing on resource exhaustion vectors. 6. For legacy or EOL Tomcat versions that cannot be immediately upgraded, consider isolating them behind reverse proxies or load balancers with strict traffic controls. 7. Maintain an incident response plan to quickly address potential denial of service incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-05-29T15:24:32.685Z
Cvss Version
null
State
PUBLISHED

Threat ID: 685027eca8c921274384359f

Added to database: 6/16/2025, 2:19:24 PM

Last enriched: 11/6/2025, 1:45:27 AM

Last updated: 11/20/2025, 1:47:17 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats