CVE-2025-55668: CWE-384 Session Fixation in Apache Software Foundation Apache Tomcat
Session Fixation vulnerability in Apache Tomcat via rewrite valve. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
AI Analysis
Technical Summary
CVE-2025-55668 is a session fixation vulnerability classified under CWE-384, found in the Apache Tomcat server's rewrite valve component. The flaw exists in versions 9.0.0.M1 through 9.0.105, 10.1.0-M1 through 10.1.41, and 11.0.0-M1 through 11.0.7. Session fixation attacks allow an adversary to set or fix a user's session identifier before authentication, enabling them to hijack the session once the user logs in. This vulnerability arises because the rewrite valve does not properly regenerate or invalidate session identifiers upon authentication or session establishment, allowing attackers to coerce users into authenticating with a session ID known to the attacker. The CVSS 3.1 base score is 6.5, reflecting a network attack vector with low complexity, no privileges required, but requiring user interaction. The impact is high on confidentiality as attackers can impersonate legitimate users, but integrity and availability are not affected. No public exploits have been reported yet, but the vulnerability is significant due to the widespread use of Apache Tomcat in enterprise and web application environments. The recommended fix is to upgrade to Apache Tomcat versions 9.0.106, 10.1.42, or 11.0.8, which address this issue by ensuring proper session management and regeneration of session IDs during authentication flows.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to sensitive web applications hosted on Apache Tomcat servers. Attackers exploiting this flaw can hijack user sessions, potentially gaining access to confidential data, internal systems, or administrative interfaces without needing credentials. This can lead to data breaches, compliance violations (e.g., GDPR), and reputational damage. Sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to their reliance on secure web services. The medium severity score indicates a moderate but tangible risk, especially in environments where session management is critical. Since exploitation requires user interaction, phishing or social engineering could be used to lure victims into using attacker-controlled session IDs. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure.
Mitigation Recommendations
1. Upgrade Apache Tomcat to the fixed versions: 9.0.106, 10.1.42, or 11.0.8 as soon as possible to ensure the vulnerability is patched. 2. Review and harden session management policies, ensuring session IDs are regenerated upon authentication and that session fixation protections are enabled. 3. Implement web application firewalls (WAFs) to detect and block suspicious session fixation attempts or abnormal session behaviors. 4. Educate users about phishing and social engineering risks that could facilitate session fixation exploitation. 5. Conduct regular security assessments and penetration testing focusing on session management vulnerabilities. 6. Monitor logs for unusual session activity or repeated session ID reuse patterns. 7. For legacy or EOL Tomcat versions that cannot be immediately upgraded, consider isolating affected services behind additional security layers or reverse proxies that can enforce session security controls.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-55668: CWE-384 Session Fixation in Apache Software Foundation Apache Tomcat
Description
Session Fixation vulnerability in Apache Tomcat via rewrite valve. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-55668 is a session fixation vulnerability classified under CWE-384, found in the Apache Tomcat server's rewrite valve component. The flaw exists in versions 9.0.0.M1 through 9.0.105, 10.1.0-M1 through 10.1.41, and 11.0.0-M1 through 11.0.7. Session fixation attacks allow an adversary to set or fix a user's session identifier before authentication, enabling them to hijack the session once the user logs in. This vulnerability arises because the rewrite valve does not properly regenerate or invalidate session identifiers upon authentication or session establishment, allowing attackers to coerce users into authenticating with a session ID known to the attacker. The CVSS 3.1 base score is 6.5, reflecting a network attack vector with low complexity, no privileges required, but requiring user interaction. The impact is high on confidentiality as attackers can impersonate legitimate users, but integrity and availability are not affected. No public exploits have been reported yet, but the vulnerability is significant due to the widespread use of Apache Tomcat in enterprise and web application environments. The recommended fix is to upgrade to Apache Tomcat versions 9.0.106, 10.1.42, or 11.0.8, which address this issue by ensuring proper session management and regeneration of session IDs during authentication flows.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized access to sensitive web applications hosted on Apache Tomcat servers. Attackers exploiting this flaw can hijack user sessions, potentially gaining access to confidential data, internal systems, or administrative interfaces without needing credentials. This can lead to data breaches, compliance violations (e.g., GDPR), and reputational damage. Sectors such as finance, healthcare, government, and critical infrastructure are particularly vulnerable due to their reliance on secure web services. The medium severity score indicates a moderate but tangible risk, especially in environments where session management is critical. Since exploitation requires user interaction, phishing or social engineering could be used to lure victims into using attacker-controlled session IDs. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits rapidly after disclosure.
Mitigation Recommendations
1. Upgrade Apache Tomcat to the fixed versions: 9.0.106, 10.1.42, or 11.0.8 as soon as possible to ensure the vulnerability is patched. 2. Review and harden session management policies, ensuring session IDs are regenerated upon authentication and that session fixation protections are enabled. 3. Implement web application firewalls (WAFs) to detect and block suspicious session fixation attempts or abnormal session behaviors. 4. Educate users about phishing and social engineering risks that could facilitate session fixation exploitation. 5. Conduct regular security assessments and penetration testing focusing on session management vulnerabilities. 6. Monitor logs for unusual session activity or repeated session ID reuse patterns. 7. For legacy or EOL Tomcat versions that cannot be immediately upgraded, consider isolating affected services behind additional security layers or reverse proxies that can enforce session security controls.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-08-13T12:16:36.881Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 689c9400ad5a09ad0041cfb8
Added to database: 8/13/2025, 1:32:48 PM
Last enriched: 11/5/2025, 3:50:04 PM
Last updated: 11/5/2025, 7:51:35 PM
Views: 71
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-55343: n/a
CriticalCVE-2025-10853: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in WSO2 WSO2 Open Banking IAM
MediumCVE-2025-5770: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in WSO2 WSO2 Identity Server
MediumCVE-2025-63418: n/a
HighCVE-2025-63417: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.