Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49125: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Apache Software Foundation Apache Tomcat

0
High
VulnerabilityCVE-2025-49125cvecve-2025-49125cwe-288
Published: Mon Jun 16 2025 (06/16/2025, 14:18:09 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.

AI-Powered Analysis

AILast updated: 11/06/2025, 01:45:44 UTC

Technical Analysis

CVE-2025-49125 is an authentication bypass vulnerability classified under CWE-288, discovered in the Apache Software Foundation's Apache Tomcat server. The issue occurs when PreResources or PostResources are mounted at locations other than the root of a web application. These resources can then be accessed via an alternate, unexpected path that is not protected by the same security constraints as the intended path. This discrepancy allows attackers to circumvent authentication mechanisms and gain unauthorized access to sensitive resources. The vulnerability affects multiple Tomcat versions, specifically from 8.5.0 through 8.5.100 (EOL but affected), 9.0.0.M1 through 9.0.105, 10.1.0-M1 through 10.1.41, and 11.0.0-M1 through 11.0.7. The flaw does not require any privileges or user interaction to exploit and can be triggered remotely over the network. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the potential for unauthorized data disclosure. The vulnerability impacts confidentiality but does not affect integrity or availability. No public exploits have been reported yet, but the nature of the flaw suggests it could be leveraged to access sensitive information or internal application resources that should be protected. The Apache Software Foundation has released fixed versions 11.0.8, 10.1.42, and 9.0.106 to address this issue. Organizations using affected versions should prioritize upgrading and review their resource mounting configurations to ensure security constraints are consistently applied.

Potential Impact

For European organizations, the impact of CVE-2025-49125 is significant due to the widespread use of Apache Tomcat in enterprise, government, and critical infrastructure environments. Unauthorized access to protected resources can lead to exposure of sensitive data, including personal information, intellectual property, or internal application logic, potentially violating GDPR and other data protection regulations. The confidentiality breach could damage organizational reputation, result in regulatory fines, and facilitate further attacks such as data exfiltration or lateral movement within networks. Since the vulnerability does not affect integrity or availability, direct system disruption is unlikely; however, the loss of confidentiality alone is critical. The ease of remote exploitation without authentication increases the risk of automated scanning and attacks. European sectors with high reliance on Tomcat for web services, such as finance, healthcare, public administration, and telecommunications, are particularly vulnerable. The vulnerability also poses risks to cloud-hosted applications and managed services operating within Europe, where compliance and data sovereignty are paramount.

Mitigation Recommendations

The primary mitigation is to upgrade Apache Tomcat to the fixed versions 11.0.8, 10.1.42, or 9.0.106 as soon as possible. Organizations should audit their web applications to identify any use of PreResources or PostResources mounted at non-root paths and verify that security constraints are correctly applied to all resource paths. Implement strict access control policies and consider additional application-layer protections such as Web Application Firewalls (WAFs) configured to detect and block unusual path traversal attempts. Conduct thorough penetration testing and code reviews focusing on resource mounting and access control configurations. Monitor network traffic and logs for anomalous access patterns that may indicate exploitation attempts. For environments where immediate upgrade is not feasible, consider isolating vulnerable Tomcat instances behind network segmentation and restricting access to trusted users only. Maintain up-to-date backups and incident response plans to quickly address any potential breaches resulting from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-06-02T09:08:38.126Z
Cvss Version
null
State
PUBLISHED

Threat ID: 685027eca8c92127438435a2

Added to database: 6/16/2025, 2:19:24 PM

Last enriched: 11/6/2025, 1:45:44 AM

Last updated: 11/22/2025, 4:44:34 PM

Views: 67

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats