Skip to main content

CVE-2025-52520: CWE-190 Integer Overflow or Wraparound in Apache Software Foundation Apache Tomcat

High
VulnerabilityCVE-2025-52520cvecve-2025-52520cwe-190
Published: Thu Jul 10 2025 (07/10/2025, 19:05:41 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache Tomcat could lead to a DoS via bypassing of size limits. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.

AI-Powered Analysis

AILast updated: 07/17/2025, 21:10:29 UTC

Technical Analysis

CVE-2025-52520 is a high-severity integer overflow vulnerability identified in the Apache Software Foundation's Apache Tomcat server, affecting versions from 11.0.0-M1 through 11.0.8, 10.1.0-M1 through 10.1.42, and 9.0.0.M1 through 9.0.106. The vulnerability arises specifically in the handling of multipart uploads under certain unlikely configurations. An integer overflow or wraparound (CWE-190) occurs when the size calculations for multipart upload data exceed the maximum value an integer can hold, causing the size limit checks to be bypassed. This bypass can lead to a denial of service (DoS) condition, as the server may accept and attempt to process data beyond intended limits, potentially exhausting resources or causing crashes. The vulnerability does not impact confidentiality or integrity directly but affects availability by enabling attackers to disrupt service. The CVSS v3.1 base score is 7.5, reflecting a high severity with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), and high impact on availability (A:H). No known exploits are currently reported in the wild. The recommended remediation is to upgrade Apache Tomcat to versions 11.0.9, 10.1.43, or 9.0.107, which contain fixes for this issue.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of web applications and services relying on Apache Tomcat servers, which are widely used across industries including finance, government, healthcare, and e-commerce. A successful exploitation could lead to denial of service, causing downtime, service disruption, and potential loss of business continuity. This is particularly critical for organizations with high availability requirements or those providing essential services. Since no authentication or user interaction is required, attackers can remotely trigger the vulnerability, increasing the risk of automated or large-scale attacks. The bypass of multipart upload size limits could also lead to resource exhaustion, impacting server performance and potentially cascading to affect other dependent systems. Although no data breach or integrity compromise is indicated, the operational impact and reputational damage from service outages can be substantial.

Mitigation Recommendations

European organizations should prioritize upgrading Apache Tomcat to the fixed versions (11.0.9, 10.1.43, or 9.0.107) as the primary mitigation step. Until upgrades are applied, organizations can implement strict network-level controls to limit exposure of Tomcat servers to untrusted networks, including firewall rules and web application firewalls (WAF) configured to detect and block abnormal multipart upload requests. Monitoring and alerting on unusual multipart upload traffic patterns can help detect exploitation attempts. Additionally, organizations should review and tighten multipart upload configurations to avoid unlikely or non-standard settings that could trigger the vulnerability. Regular vulnerability scanning and patch management processes should be enforced to ensure timely detection and remediation of such issues. Finally, incident response plans should be updated to include scenarios involving DoS attacks targeting multipart upload functionality.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-06-17T07:31:32.117Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68701177a83201eaaca96453

Added to database: 7/10/2025, 7:16:07 PM

Last enriched: 7/17/2025, 9:10:29 PM

Last updated: 7/26/2025, 5:53:44 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats