CVE-2025-55754: CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences in Apache Software Foundation Apache Tomcat
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
AI Analysis
Technical Summary
CVE-2025-55754 is a critical security vulnerability classified under CWE-150, which involves improper neutralization of escape, meta, or control sequences in Apache Tomcat. Specifically, Tomcat failed to escape ANSI escape sequences in log messages. When Tomcat runs in a Windows console environment that supports ANSI escape sequences, an attacker can craft a malicious URL that injects these sequences into the logs. This injection can manipulate the console display and clipboard contents, potentially deceiving an administrator into executing commands controlled by the attacker. The vulnerability affects Apache Tomcat versions from 11.0.0-M1 through 11.0.10, 10.1.0-M1 through 10.1.44, and 9.0.40 through 9.0.108, as well as end-of-life versions 8.5.60 through 8.5.100. Although no direct attack vectors have been confirmed on non-Windows systems, the possibility exists. The vulnerability does not require authentication but does require user interaction, such as an administrator viewing the manipulated logs in a vulnerable console. The issue was publicly disclosed on October 27, 2025, with Apache recommending upgrades to versions 11.0.11 or later, 10.1.45 or later, and 9.0.109 or later to remediate the flaw. The CVSS v3.1 score is 9.6 (critical), indicating a high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, no privileges required, user interaction required, and scope changed due to potential command execution.
Potential Impact
The vulnerability poses a significant risk to organizations running affected Apache Tomcat versions on Windows consoles. Successful exploitation can lead to manipulation of the administrator's console and clipboard, potentially tricking them into executing attacker-controlled commands. This can result in full system compromise, data theft, unauthorized access, and disruption of services. Since Tomcat is widely used in enterprise web applications, the impact spans multiple industries including finance, healthcare, government, and technology sectors. The critical CVSS score reflects the potential for complete loss of confidentiality, integrity, and availability. Additionally, the attack requires no privileges, increasing the attack surface. Although no known exploits are currently active, the ease of exploitation and the high impact make this a severe threat. Organizations that do not promptly patch may face targeted attacks leveraging social engineering to escalate privileges or deploy malware.
Mitigation Recommendations
Organizations should immediately upgrade Apache Tomcat to versions 11.0.11 or later, 10.1.45 or later, or 9.0.109 or later to apply the official patches that neutralize ANSI escape sequences in logs. Until upgrades can be performed, administrators should avoid running Tomcat in Windows consoles that support ANSI escape sequences or disable ANSI support in the console environment if possible. Logging configurations should be reviewed to limit exposure to untrusted input in logs. Additionally, administrators should be trained to recognize suspicious console behavior and avoid executing commands based on manipulated log content or clipboard data. Implementing strict access controls and monitoring for unusual command execution patterns can help detect exploitation attempts. Employing endpoint protection solutions that monitor clipboard and console activities may provide additional defense. Regular audits of Tomcat versions and patch levels across the infrastructure are essential to ensure timely remediation.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, India, Australia, Canada, Brazil
CVE-2025-55754: CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences in Apache Software Foundation Apache Tomcat
Description
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-55754 is a critical security vulnerability classified under CWE-150, which involves improper neutralization of escape, meta, or control sequences in Apache Tomcat. Specifically, Tomcat failed to escape ANSI escape sequences in log messages. When Tomcat runs in a Windows console environment that supports ANSI escape sequences, an attacker can craft a malicious URL that injects these sequences into the logs. This injection can manipulate the console display and clipboard contents, potentially deceiving an administrator into executing commands controlled by the attacker. The vulnerability affects Apache Tomcat versions from 11.0.0-M1 through 11.0.10, 10.1.0-M1 through 10.1.44, and 9.0.40 through 9.0.108, as well as end-of-life versions 8.5.60 through 8.5.100. Although no direct attack vectors have been confirmed on non-Windows systems, the possibility exists. The vulnerability does not require authentication but does require user interaction, such as an administrator viewing the manipulated logs in a vulnerable console. The issue was publicly disclosed on October 27, 2025, with Apache recommending upgrades to versions 11.0.11 or later, 10.1.45 or later, and 9.0.109 or later to remediate the flaw. The CVSS v3.1 score is 9.6 (critical), indicating a high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, no privileges required, user interaction required, and scope changed due to potential command execution.
Potential Impact
The vulnerability poses a significant risk to organizations running affected Apache Tomcat versions on Windows consoles. Successful exploitation can lead to manipulation of the administrator's console and clipboard, potentially tricking them into executing attacker-controlled commands. This can result in full system compromise, data theft, unauthorized access, and disruption of services. Since Tomcat is widely used in enterprise web applications, the impact spans multiple industries including finance, healthcare, government, and technology sectors. The critical CVSS score reflects the potential for complete loss of confidentiality, integrity, and availability. Additionally, the attack requires no privileges, increasing the attack surface. Although no known exploits are currently active, the ease of exploitation and the high impact make this a severe threat. Organizations that do not promptly patch may face targeted attacks leveraging social engineering to escalate privileges or deploy malware.
Mitigation Recommendations
Organizations should immediately upgrade Apache Tomcat to versions 11.0.11 or later, 10.1.45 or later, or 9.0.109 or later to apply the official patches that neutralize ANSI escape sequences in logs. Until upgrades can be performed, administrators should avoid running Tomcat in Windows consoles that support ANSI escape sequences or disable ANSI support in the console environment if possible. Logging configurations should be reviewed to limit exposure to untrusted input in logs. Additionally, administrators should be trained to recognize suspicious console behavior and avoid executing commands based on manipulated log content or clipboard data. Implementing strict access controls and monitoring for unusual command execution patterns can help detect exploitation attempts. Employing endpoint protection solutions that monitor clipboard and console activities may provide additional defense. Regular audits of Tomcat versions and patch levels across the infrastructure are essential to ensure timely remediation.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-08-15T11:26:40.520Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68ffadeaba6dffc5e2050674
Added to database: 10/27/2025, 5:37:46 PM
Last enriched: 2/27/2026, 5:37:34 AM
Last updated: 3/25/2026, 3:38:54 AM
Views: 1117
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.