Skip to main content

CVE-2025-49124: CWE-426 Untrusted Search Path in Apache Software Foundation Apache Tomcat

High
VulnerabilityCVE-2025-49124cvecve-2025-49124cwe-426
Published: Mon Jun 16 2025 (06/16/2025, 14:22:16 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

Untrusted Search Path vulnerability in Apache Tomcat installer for Windows. During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0 through 10.1.41, from 9.0.23 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100 and 7.0.95 through 7.0.109. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.

AI-Powered Analysis

AILast updated: 08/08/2025, 00:39:08 UTC

Technical Analysis

CVE-2025-49124 is a high-severity vulnerability identified in the Apache Tomcat installer for Windows platforms. The root cause is an untrusted search path issue (CWE-426) during the installation process. Specifically, the Tomcat installer invokes the Windows utility icacls.exe without specifying its full filesystem path. This behavior can allow an attacker to place a malicious executable named icacls.exe earlier in the system's PATH environment variable, causing the installer to execute the attacker's code instead of the legitimate Windows utility. The vulnerability affects Apache Tomcat versions 11.0.0-M1 through 11.0.7, 10.1.0 through 10.1.41, and 9.0.23 through 9.0.105, including potentially older end-of-life versions. The impact of this vulnerability is critical because it can lead to arbitrary code execution with the privileges of the user running the installer, potentially resulting in full system compromise. The CVSS v3.1 score is 8.4, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity, no privileges required, and no user interaction needed beyond running the installer. The issue is resolved in Apache Tomcat versions 11.0.8, 10.1.42, and 9.0.106, where the installer specifies the full path to icacls.exe, mitigating the untrusted search path risk. No known exploits are currently reported in the wild, but the nature of the vulnerability makes it a significant risk especially in environments where Windows-based Tomcat installations are performed.

Potential Impact

For European organizations, this vulnerability poses a substantial risk particularly to those deploying Apache Tomcat on Windows servers or workstations. Successful exploitation could allow attackers to execute arbitrary code during installation, potentially leading to full system compromise, data breaches, or disruption of critical services. Given Apache Tomcat's widespread use in enterprise web applications, including government, finance, healthcare, and industrial sectors across Europe, the impact could extend to sensitive personal data, intellectual property, and operational continuity. The vulnerability's exploitation does not require user interaction beyond running the installer, increasing the risk in environments where software installation is performed without strict controls. Additionally, compromised systems could be used as footholds for lateral movement within corporate networks, amplifying the threat. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high CVSS score underscores the urgency for patching.

Mitigation Recommendations

European organizations should immediately verify their Apache Tomcat installations on Windows platforms and upgrade to the fixed versions 11.0.8, 10.1.42, or 9.0.106 as appropriate. Where immediate upgrade is not feasible, organizations should implement the following mitigations: (1) Restrict software installation privileges to trusted administrators only to prevent unauthorized execution of the vulnerable installer. (2) Prior to installation, verify the integrity and authenticity of the Tomcat installer using official checksums and signatures to avoid tampered installers. (3) Audit and sanitize the system PATH environment variable to ensure no untrusted directories precede system32 or other Windows system folders, preventing malicious icacls.exe from being invoked. (4) Employ application whitelisting or endpoint protection solutions that can detect or block execution of unauthorized binaries during installation. (5) Monitor installation activities and system logs for anomalies indicating potential exploitation attempts. (6) Educate IT staff on the risks of untrusted search path vulnerabilities and secure installation best practices. These targeted mitigations reduce the risk of exploitation while patch deployment is planned and executed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-06-02T08:34:46.719Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68502b73a8c92127438438cb

Added to database: 6/16/2025, 2:34:27 PM

Last enriched: 8/8/2025, 12:39:08 AM

Last updated: 8/11/2025, 12:33:50 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats