CVE-2025-55752: CWE-23 Relative Path Traversal in Apache Software Foundation Apache Tomcat
Relative Path Traversal vulnerability in Apache Tomcat. The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
AI Analysis
Technical Summary
CVE-2025-55752 is a security vulnerability classified under CWE-23 (Relative Path Traversal) found in Apache Tomcat web server software. The root cause is a regression introduced by a fix for a previous bug (60013), where the rewritten URL was normalized before decoding. This sequence allowed attackers to craft specially manipulated request URIs that could bypass security constraints designed to protect critical directories such as /WEB-INF/ and /META-INF/. These directories typically contain configuration files and sensitive application resources that should not be accessible externally. The vulnerability is particularly dangerous when combined with enabled HTTP PUT requests, which allow clients to upload files to the server. In such scenarios, an attacker could upload malicious files into protected directories, potentially leading to remote code execution on the server. However, PUT requests are generally disabled or restricted to trusted users, making exploitation less likely but still possible in misconfigured environments. The affected Apache Tomcat versions span from early milestone releases (e.g., 11.0.0-M1, 10.1.0-M1, 9.0.0.M11) through stable releases up to 11.0.10, 10.1.44, and 9.0.108, including some end-of-life versions like 8.5.6 through 8.5.100. The Apache Software Foundation has released patches in versions 11.0.11, 10.1.45, and 9.0.109 to address this issue. No public exploits have been reported yet, but the vulnerability's nature and potential impact warrant immediate attention. The vulnerability requires no authentication but does require the attacker to send crafted HTTP requests, and user interaction is not needed. The flaw affects confidentiality, integrity, and availability by exposing sensitive files and enabling possible remote code execution.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Apache Tomcat for hosting web applications, including government portals, financial services, healthcare systems, and critical infrastructure. Exploitation could lead to unauthorized access to sensitive configuration files and application data, undermining confidentiality. If PUT requests are enabled, attackers could upload malicious payloads, leading to remote code execution, which threatens system integrity and availability. This could result in data breaches, service disruptions, and potential lateral movement within networks. Given the widespread use of Apache Tomcat in enterprise environments across Europe, the vulnerability could impact a broad range of sectors. Organizations with legacy or end-of-life Tomcat versions are particularly at risk due to lack of ongoing security support. The absence of known exploits currently provides a window for proactive mitigation, but the potential for rapid weaponization exists. Compliance with data protection regulations such as GDPR also raises the stakes, as breaches could lead to significant legal and financial penalties.
Mitigation Recommendations
European organizations should immediately assess their Apache Tomcat deployments to identify affected versions. The primary mitigation is to upgrade to patched versions: 11.0.11 or later, 10.1.45 or later, or 9.0.109 or later. For environments where upgrading is not immediately feasible, organizations should disable HTTP PUT requests unless explicitly required and tightly control access to these methods. Review and harden rewrite rules to ensure they do not manipulate query parameters in ways that could be exploited. Implement strict access controls and monitoring on sensitive directories such as /WEB-INF/ and /META-INF/. Employ web application firewalls (WAFs) with rules designed to detect and block path traversal attempts. Conduct thorough security testing and code reviews to detect similar logic flaws. Additionally, monitor logs for suspicious request patterns indicative of exploitation attempts. Finally, maintain an incident response plan that includes steps for containment and remediation in case of compromise.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-55752: CWE-23 Relative Path Traversal in Apache Software Foundation Apache Tomcat
Description
Relative Path Traversal vulnerability in Apache Tomcat. The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-55752 is a security vulnerability classified under CWE-23 (Relative Path Traversal) found in Apache Tomcat web server software. The root cause is a regression introduced by a fix for a previous bug (60013), where the rewritten URL was normalized before decoding. This sequence allowed attackers to craft specially manipulated request URIs that could bypass security constraints designed to protect critical directories such as /WEB-INF/ and /META-INF/. These directories typically contain configuration files and sensitive application resources that should not be accessible externally. The vulnerability is particularly dangerous when combined with enabled HTTP PUT requests, which allow clients to upload files to the server. In such scenarios, an attacker could upload malicious files into protected directories, potentially leading to remote code execution on the server. However, PUT requests are generally disabled or restricted to trusted users, making exploitation less likely but still possible in misconfigured environments. The affected Apache Tomcat versions span from early milestone releases (e.g., 11.0.0-M1, 10.1.0-M1, 9.0.0.M11) through stable releases up to 11.0.10, 10.1.44, and 9.0.108, including some end-of-life versions like 8.5.6 through 8.5.100. The Apache Software Foundation has released patches in versions 11.0.11, 10.1.45, and 9.0.109 to address this issue. No public exploits have been reported yet, but the vulnerability's nature and potential impact warrant immediate attention. The vulnerability requires no authentication but does require the attacker to send crafted HTTP requests, and user interaction is not needed. The flaw affects confidentiality, integrity, and availability by exposing sensitive files and enabling possible remote code execution.
Potential Impact
For European organizations, this vulnerability poses a significant risk, especially for those relying on Apache Tomcat for hosting web applications, including government portals, financial services, healthcare systems, and critical infrastructure. Exploitation could lead to unauthorized access to sensitive configuration files and application data, undermining confidentiality. If PUT requests are enabled, attackers could upload malicious payloads, leading to remote code execution, which threatens system integrity and availability. This could result in data breaches, service disruptions, and potential lateral movement within networks. Given the widespread use of Apache Tomcat in enterprise environments across Europe, the vulnerability could impact a broad range of sectors. Organizations with legacy or end-of-life Tomcat versions are particularly at risk due to lack of ongoing security support. The absence of known exploits currently provides a window for proactive mitigation, but the potential for rapid weaponization exists. Compliance with data protection regulations such as GDPR also raises the stakes, as breaches could lead to significant legal and financial penalties.
Mitigation Recommendations
European organizations should immediately assess their Apache Tomcat deployments to identify affected versions. The primary mitigation is to upgrade to patched versions: 11.0.11 or later, 10.1.45 or later, or 9.0.109 or later. For environments where upgrading is not immediately feasible, organizations should disable HTTP PUT requests unless explicitly required and tightly control access to these methods. Review and harden rewrite rules to ensure they do not manipulate query parameters in ways that could be exploited. Implement strict access controls and monitoring on sensitive directories such as /WEB-INF/ and /META-INF/. Employ web application firewalls (WAFs) with rules designed to detect and block path traversal attempts. Conduct thorough security testing and code reviews to detect similar logic flaws. Additionally, monitor logs for suspicious request patterns indicative of exploitation attempts. Finally, maintain an incident response plan that includes steps for containment and remediation in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-08-15T08:14:18.969Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68ffadeaba6dffc5e205066e
Added to database: 10/27/2025, 5:37:46 PM
Last enriched: 10/27/2025, 5:53:41 PM
Last updated: 10/27/2025, 7:47:11 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-61105: n/a
UnknownCVE-2025-61101: n/a
UnknownCVE-2025-58356: CWE-347: Improper Verification of Cryptographic Signature in edgelesssys constellation
HighCVE-2025-12312: Cross Site Scripting in PHPGurukul Curfew e-Pass Management System
MediumCVE-2025-12311: Cross Site Scripting in PHPGurukul Curfew e-Pass Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.