CVE-2025-49124: CWE-426 Untrusted Search Path in Apache Software Foundation Apache Tomcat
Untrusted Search Path vulnerability in Apache Tomcat installer for Windows. During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0 through 10.1.41, from 9.0.23 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100 and 7.0.95 through 7.0.109. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
AI Analysis
Technical Summary
CVE-2025-49124 is an untrusted search path vulnerability classified under CWE-426, affecting the Apache Tomcat installer for Windows. During installation, the Tomcat installer invokes the Windows utility icacls.exe without specifying its absolute path. This allows an attacker with local access to place a malicious icacls.exe executable in a directory that appears earlier in the system's PATH environment variable. When the installer runs, it executes the attacker's malicious binary instead of the legitimate system utility. This can lead to arbitrary code execution with the privileges of the user running the installer, potentially escalating to full system compromise. The vulnerability affects Apache Tomcat versions from 11.0.0-M1 through 11.0.7, 10.1.0 through 10.1.41, 9.0.23 through 9.0.105, and older EOL versions such as 8.5.0 through 8.5.100 and 7.0.95 through 7.0.109. The CVSS v3.1 base score is 8.4 (high severity), reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. The issue is resolved in Apache Tomcat versions 11.0.8, 10.1.42, and 9.0.106. No known exploits have been reported in the wild yet, but the vulnerability represents a significant risk especially in environments where local access can be obtained by attackers or malicious insiders. The root cause is the failure to specify a fully qualified path to icacls.exe, a common Windows system utility used to modify access control lists, during the installation process. This oversight allows attackers to hijack the execution flow during installation, a critical phase where elevated privileges are often granted.
Potential Impact
For European organizations, this vulnerability poses a serious risk especially in environments where Apache Tomcat is installed or upgraded on Windows systems. Successful exploitation can lead to arbitrary code execution with the privileges of the installer, potentially allowing attackers to escalate privileges, install persistent malware, or disrupt services. This can compromise sensitive data confidentiality, integrity, and availability of critical applications running on Tomcat. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Apache Tomcat for web services are particularly vulnerable. The local access requirement limits remote exploitation but insider threats or attackers who gain initial foothold on internal networks can leverage this vulnerability to deepen their control. The lack of user interaction requirement further increases risk, as exploitation can be automated once local access is achieved. Given the widespread use of Apache Tomcat across Europe, failure to patch could lead to significant operational disruptions and data breaches.
Mitigation Recommendations
European organizations should immediately verify their Apache Tomcat versions and upgrade to the fixed releases: 11.0.8, 10.1.42, or 9.0.106. For EOL versions still in use, consider upgrading to supported versions or applying manual mitigations such as ensuring the Windows PATH environment variable does not include untrusted directories before system32, and restricting write permissions on directories included in the PATH to prevent malicious executable placement. Employ application whitelisting to block unauthorized executables from running, especially in installation contexts. Limit local administrative privileges and monitor for suspicious file creation or execution during installation processes. Conduct regular audits of system PATH variables and installed software to detect anomalies. Additionally, educate IT staff about the risks of installing software from untrusted sources or locations. Implement endpoint detection and response (EDR) solutions to detect attempts to exploit untrusted search path vulnerabilities. Finally, maintain a robust patch management process to ensure timely application of security updates.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-49124: CWE-426 Untrusted Search Path in Apache Software Foundation Apache Tomcat
Description
Untrusted Search Path vulnerability in Apache Tomcat installer for Windows. During installation, the Tomcat installer for Windows used icacls.exe without specifying a full path. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0 through 10.1.41, from 9.0.23 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100 and 7.0.95 through 7.0.109. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-49124 is an untrusted search path vulnerability classified under CWE-426, affecting the Apache Tomcat installer for Windows. During installation, the Tomcat installer invokes the Windows utility icacls.exe without specifying its absolute path. This allows an attacker with local access to place a malicious icacls.exe executable in a directory that appears earlier in the system's PATH environment variable. When the installer runs, it executes the attacker's malicious binary instead of the legitimate system utility. This can lead to arbitrary code execution with the privileges of the user running the installer, potentially escalating to full system compromise. The vulnerability affects Apache Tomcat versions from 11.0.0-M1 through 11.0.7, 10.1.0 through 10.1.41, 9.0.23 through 9.0.105, and older EOL versions such as 8.5.0 through 8.5.100 and 7.0.95 through 7.0.109. The CVSS v3.1 base score is 8.4 (high severity), reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges or user interaction required. The issue is resolved in Apache Tomcat versions 11.0.8, 10.1.42, and 9.0.106. No known exploits have been reported in the wild yet, but the vulnerability represents a significant risk especially in environments where local access can be obtained by attackers or malicious insiders. The root cause is the failure to specify a fully qualified path to icacls.exe, a common Windows system utility used to modify access control lists, during the installation process. This oversight allows attackers to hijack the execution flow during installation, a critical phase where elevated privileges are often granted.
Potential Impact
For European organizations, this vulnerability poses a serious risk especially in environments where Apache Tomcat is installed or upgraded on Windows systems. Successful exploitation can lead to arbitrary code execution with the privileges of the installer, potentially allowing attackers to escalate privileges, install persistent malware, or disrupt services. This can compromise sensitive data confidentiality, integrity, and availability of critical applications running on Tomcat. Organizations in sectors such as finance, healthcare, government, and critical infrastructure that rely on Apache Tomcat for web services are particularly vulnerable. The local access requirement limits remote exploitation but insider threats or attackers who gain initial foothold on internal networks can leverage this vulnerability to deepen their control. The lack of user interaction requirement further increases risk, as exploitation can be automated once local access is achieved. Given the widespread use of Apache Tomcat across Europe, failure to patch could lead to significant operational disruptions and data breaches.
Mitigation Recommendations
European organizations should immediately verify their Apache Tomcat versions and upgrade to the fixed releases: 11.0.8, 10.1.42, or 9.0.106. For EOL versions still in use, consider upgrading to supported versions or applying manual mitigations such as ensuring the Windows PATH environment variable does not include untrusted directories before system32, and restricting write permissions on directories included in the PATH to prevent malicious executable placement. Employ application whitelisting to block unauthorized executables from running, especially in installation contexts. Limit local administrative privileges and monitor for suspicious file creation or execution during installation processes. Conduct regular audits of system PATH variables and installed software to detect anomalies. Additionally, educate IT staff about the risks of installing software from untrusted sources or locations. Implement endpoint detection and response (EDR) solutions to detect attempts to exploit untrusted search path vulnerabilities. Finally, maintain a robust patch management process to ensure timely application of security updates.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-06-02T08:34:46.719Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68502b73a8c92127438438cb
Added to database: 6/16/2025, 2:34:27 PM
Last enriched: 10/29/2025, 12:28:51 PM
Last updated: 11/22/2025, 4:47:34 PM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.