CVE-2025-55754: CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences in Apache Software Foundation Apache Tomcat
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
AI Analysis
Technical Summary
CVE-2025-55754 is a vulnerability classified under CWE-150 (Improper Neutralization of Escape, Meta, or Control Sequences) affecting Apache Tomcat versions 8.5.60 through 11.0.10. The flaw arises because Tomcat fails to properly escape ANSI escape sequences in log messages. When Tomcat runs in a Windows console environment that supports ANSI sequences, an attacker can craft a malicious URL that injects ANSI escape sequences into the console output. These sequences can manipulate the console display and the Windows clipboard, enabling social engineering attacks where an administrator might be tricked into executing commands controlled by the attacker. The vulnerability is notable because it leverages the console environment rather than direct code execution, relying on user interaction to trigger the attack. The issue affects multiple major Tomcat branches, including versions that were end-of-life at the time of discovery. The CVSS v3.1 score is 9.6 (critical), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction, and impacts confidentiality, integrity, and availability with scope change. No known exploits are currently in the wild, but the potential for severe impact exists. The recommended remediation is upgrading to fixed versions 11.0.11 or later, 10.1.45 or later, or 9.0.109 or later.
Potential Impact
For European organizations, this vulnerability poses a critical risk especially for those running Apache Tomcat on Windows servers with console access. Successful exploitation could lead to unauthorized command execution via social engineering, compromising system confidentiality, integrity, and availability. This can result in data breaches, system manipulation, and potential lateral movement within networks. Given Apache Tomcat's widespread use in enterprise web applications and internal services across Europe, the vulnerability could affect sectors such as finance, government, healthcare, and critical infrastructure. The attack vector requires user interaction but no authentication, increasing the risk in environments where administrators directly monitor Tomcat consoles. The clipboard manipulation aspect could facilitate credential theft or injection of malicious commands, amplifying the threat. Although no active exploits are reported, the high CVSS score and ease of exploitation warrant immediate attention to prevent potential targeted attacks.
Mitigation Recommendations
Organizations should immediately identify all Apache Tomcat instances running affected versions, especially those on Windows platforms with console access. Upgrade to the patched versions 11.0.11+, 10.1.45+, or 9.0.109+ without delay. Where immediate upgrade is not feasible, restrict console access to trusted personnel only and disable ANSI escape sequence support in the console if possible. Implement strict monitoring and alerting on Tomcat logs for suspicious input patterns resembling escape sequences. Educate administrators about the risk of social engineering attacks leveraging console manipulation and clipboard injection. Employ endpoint protection solutions that can detect anomalous clipboard activity or command execution attempts. Regularly audit and harden server configurations to minimize attack surface, including limiting user interaction scenarios that could trigger the exploit. Finally, maintain an incident response plan tailored to quickly address any signs of compromise related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-55754: CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences in Apache Software Foundation Apache Tomcat
Description
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-55754 is a vulnerability classified under CWE-150 (Improper Neutralization of Escape, Meta, or Control Sequences) affecting Apache Tomcat versions 8.5.60 through 11.0.10. The flaw arises because Tomcat fails to properly escape ANSI escape sequences in log messages. When Tomcat runs in a Windows console environment that supports ANSI sequences, an attacker can craft a malicious URL that injects ANSI escape sequences into the console output. These sequences can manipulate the console display and the Windows clipboard, enabling social engineering attacks where an administrator might be tricked into executing commands controlled by the attacker. The vulnerability is notable because it leverages the console environment rather than direct code execution, relying on user interaction to trigger the attack. The issue affects multiple major Tomcat branches, including versions that were end-of-life at the time of discovery. The CVSS v3.1 score is 9.6 (critical), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction, and impacts confidentiality, integrity, and availability with scope change. No known exploits are currently in the wild, but the potential for severe impact exists. The recommended remediation is upgrading to fixed versions 11.0.11 or later, 10.1.45 or later, or 9.0.109 or later.
Potential Impact
For European organizations, this vulnerability poses a critical risk especially for those running Apache Tomcat on Windows servers with console access. Successful exploitation could lead to unauthorized command execution via social engineering, compromising system confidentiality, integrity, and availability. This can result in data breaches, system manipulation, and potential lateral movement within networks. Given Apache Tomcat's widespread use in enterprise web applications and internal services across Europe, the vulnerability could affect sectors such as finance, government, healthcare, and critical infrastructure. The attack vector requires user interaction but no authentication, increasing the risk in environments where administrators directly monitor Tomcat consoles. The clipboard manipulation aspect could facilitate credential theft or injection of malicious commands, amplifying the threat. Although no active exploits are reported, the high CVSS score and ease of exploitation warrant immediate attention to prevent potential targeted attacks.
Mitigation Recommendations
Organizations should immediately identify all Apache Tomcat instances running affected versions, especially those on Windows platforms with console access. Upgrade to the patched versions 11.0.11+, 10.1.45+, or 9.0.109+ without delay. Where immediate upgrade is not feasible, restrict console access to trusted personnel only and disable ANSI escape sequence support in the console if possible. Implement strict monitoring and alerting on Tomcat logs for suspicious input patterns resembling escape sequences. Educate administrators about the risk of social engineering attacks leveraging console manipulation and clipboard injection. Employ endpoint protection solutions that can detect anomalous clipboard activity or command execution attempts. Regularly audit and harden server configurations to minimize attack surface, including limiting user interaction scenarios that could trigger the exploit. Finally, maintain an incident response plan tailored to quickly address any signs of compromise related to this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-08-15T11:26:40.520Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68ffadeaba6dffc5e2050674
Added to database: 10/27/2025, 5:37:46 PM
Last enriched: 12/9/2025, 5:10:02 AM
Last updated: 12/11/2025, 11:52:02 PM
Views: 746
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67779: (CWE-502) Deserialization of Untrusted Data, (CWE-400) Uncontrolled Resource Consumption in Meta react-server-dom-parcel
HighCVE-2025-67780: CWE-306 Missing Authentication for Critical Function in SpaceX Starlink Dish
MediumCVE-2025-66452: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in danny-avila LibreChat
MediumCVE-2025-66451: CWE-20: Improper Input Validation in danny-avila LibreChat
MediumCVE-2025-66588: CWE-824 Access of Uninitialized Pointer in AzeoTech DAQFactory
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.