Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55752: CWE-23 Relative Path Traversal in Apache Software Foundation Apache Tomcat

0
High
VulnerabilityCVE-2025-55752cvecve-2025-55752cwe-23
Published: Mon Oct 27 2025 (10/27/2025, 17:29:56 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

Relative Path Traversal vulnerability in Apache Tomcat. The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:37:20 UTC

Technical Analysis

CVE-2025-55752 is a relative path traversal vulnerability in Apache Tomcat that arises due to a regression introduced by a prior bug fix (bug 60013). The regression caused the rewritten URL to be normalized before decoding, which is a flawed sequence that allows attackers to craft request URIs that bypass security constraints designed to protect critical directories such as /WEB-INF/ and /META-INF/. These directories typically contain configuration files and sensitive application data that should not be accessible externally. The vulnerability is particularly dangerous when combined with enabled HTTP PUT requests, which allow file uploads. In such cases, an attacker could upload malicious files to the server, potentially leading to remote code execution. However, PUT requests are generally disabled or restricted to trusted users, reducing the likelihood of exploitation in many environments. The affected Apache Tomcat versions span multiple major releases: 8.5.6 through 8.5.100 (EOL but known affected), 9.0.0.M11 through 9.0.108, 10.1.0-M1 through 10.1.44, and 11.0.0-M1 through 11.0.10. The Apache Software Foundation has released patches in versions 11.0.11, 10.1.45, and 9.0.109 to address this issue. The vulnerability is classified under CWE-23 (Relative Path Traversal) and has a CVSS v3.1 base score of 7.5, indicating high severity. Exploitation requires network access, low privileges, no user interaction, and has a high impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild at the time of disclosure.

Potential Impact

This vulnerability poses a significant risk to organizations running vulnerable versions of Apache Tomcat, a widely used Java servlet container in enterprise web applications. Successful exploitation can lead to unauthorized access to sensitive directories (/WEB-INF/, /META-INF/), exposing configuration files, credentials, or application logic. If HTTP PUT is enabled, attackers can upload malicious files, potentially achieving remote code execution, which could lead to full system compromise. The breach of confidentiality, integrity, and availability can result in data theft, service disruption, and lateral movement within networks. Given Tomcat’s prevalence in government, financial, healthcare, and commercial sectors worldwide, the impact could be widespread. Organizations with strict security policies disabling PUT requests and carefully managing rewrite rules may have reduced risk, but many environments may not have these controls fully enforced. The vulnerability’s exploitation complexity is moderate due to the need to manipulate rewrite rules and possibly enable PUT, but the potential damage is severe.

Mitigation Recommendations

1. Upgrade Apache Tomcat to the fixed versions: 11.0.11 or later, 10.1.45 or later, or 9.0.109 or later immediately. 2. Review and audit all URL rewrite rules to ensure they do not inadvertently expose sensitive paths or allow query parameters to be rewritten into the URL in a way that bypasses security constraints. 3. Disable HTTP PUT requests unless explicitly required and restrict PUT access to trusted users or IP addresses using Tomcat’s security constraints or network-level controls. 4. Implement strict access controls on sensitive directories (/WEB-INF/, /META-INF/) at the web server and application levels. 5. Monitor logs for unusual requests targeting rewrite rules or attempts to access protected directories. 6. Employ web application firewalls (WAFs) with rules to detect and block path traversal attempts and suspicious PUT requests. 7. Conduct penetration testing focusing on path traversal and file upload vectors post-patching to validate the environment’s security posture. 8. Educate developers and administrators on secure URL rewriting practices and the risks of enabling PUT requests.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-08-15T08:14:18.969Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ffadeaba6dffc5e205066e

Added to database: 10/27/2025, 5:37:46 PM

Last enriched: 2/27/2026, 5:37:20 AM

Last updated: 3/23/2026, 3:31:25 PM

Views: 1880

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses