CVE-2025-55754: CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences in Apache Software Foundation Apache Tomcat
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
AI Analysis
Technical Summary
CVE-2025-55754 is a vulnerability classified under CWE-150 (Improper Neutralization of Escape, Meta, or Control Sequences) affecting Apache Tomcat versions 8.5.60 through 11.0.10. The flaw arises because Tomcat fails to properly escape ANSI escape sequences in log messages. When Tomcat runs in a Windows console environment that supports ANSI sequences, an attacker can craft a malicious URL that injects ANSI escape sequences into the console output. These sequences can manipulate the console display and the Windows clipboard, enabling social engineering attacks where an administrator might be tricked into executing commands controlled by the attacker. The vulnerability is notable because it leverages the console environment rather than direct code execution, relying on user interaction to trigger the attack. The issue affects multiple major Tomcat branches, including versions that were end-of-life at the time of discovery. The CVSS v3.1 score is 9.6 (critical), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction, and impacts confidentiality, integrity, and availability with scope change. No known exploits are currently in the wild, but the potential for severe impact exists. The recommended remediation is upgrading to fixed versions 11.0.11 or later, 10.1.45 or later, or 9.0.109 or later.
Potential Impact
For European organizations, this vulnerability poses a critical risk especially for those running Apache Tomcat on Windows servers with console access. Successful exploitation could lead to unauthorized command execution via social engineering, compromising system confidentiality, integrity, and availability. This can result in data breaches, system manipulation, and potential lateral movement within networks. Given Apache Tomcat's widespread use in enterprise web applications and internal services across Europe, the vulnerability could affect sectors such as finance, government, healthcare, and critical infrastructure. The attack vector requires user interaction but no authentication, increasing the risk in environments where administrators directly monitor Tomcat consoles. The clipboard manipulation aspect could facilitate credential theft or injection of malicious commands, amplifying the threat. Although no active exploits are reported, the high CVSS score and ease of exploitation warrant immediate attention to prevent potential targeted attacks.
Mitigation Recommendations
Organizations should immediately identify all Apache Tomcat instances running affected versions, especially those on Windows platforms with console access. Upgrade to the patched versions 11.0.11+, 10.1.45+, or 9.0.109+ without delay. Where immediate upgrade is not feasible, restrict console access to trusted personnel only and disable ANSI escape sequence support in the console if possible. Implement strict monitoring and alerting on Tomcat logs for suspicious input patterns resembling escape sequences. Educate administrators about the risk of social engineering attacks leveraging console manipulation and clipboard injection. Employ endpoint protection solutions that can detect anomalous clipboard activity or command execution attempts. Regularly audit and harden server configurations to minimize attack surface, including limiting user interaction scenarios that could trigger the exploit. Finally, maintain an incident response plan tailored to quickly address any signs of compromise related to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-55754: CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences in Apache Software Foundation Apache Tomcat
Description
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-55754 is a vulnerability classified under CWE-150 (Improper Neutralization of Escape, Meta, or Control Sequences) affecting Apache Tomcat versions 8.5.60 through 11.0.10. The flaw arises because Tomcat fails to properly escape ANSI escape sequences in log messages. When Tomcat runs in a Windows console environment that supports ANSI sequences, an attacker can craft a malicious URL that injects ANSI escape sequences into the console output. These sequences can manipulate the console display and the Windows clipboard, enabling social engineering attacks where an administrator might be tricked into executing commands controlled by the attacker. The vulnerability is notable because it leverages the console environment rather than direct code execution, relying on user interaction to trigger the attack. The issue affects multiple major Tomcat branches, including versions that were end-of-life at the time of discovery. The CVSS v3.1 score is 9.6 (critical), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction, and impacts confidentiality, integrity, and availability with scope change. No known exploits are currently in the wild, but the potential for severe impact exists. The recommended remediation is upgrading to fixed versions 11.0.11 or later, 10.1.45 or later, or 9.0.109 or later.
Potential Impact
For European organizations, this vulnerability poses a critical risk especially for those running Apache Tomcat on Windows servers with console access. Successful exploitation could lead to unauthorized command execution via social engineering, compromising system confidentiality, integrity, and availability. This can result in data breaches, system manipulation, and potential lateral movement within networks. Given Apache Tomcat's widespread use in enterprise web applications and internal services across Europe, the vulnerability could affect sectors such as finance, government, healthcare, and critical infrastructure. The attack vector requires user interaction but no authentication, increasing the risk in environments where administrators directly monitor Tomcat consoles. The clipboard manipulation aspect could facilitate credential theft or injection of malicious commands, amplifying the threat. Although no active exploits are reported, the high CVSS score and ease of exploitation warrant immediate attention to prevent potential targeted attacks.
Mitigation Recommendations
Organizations should immediately identify all Apache Tomcat instances running affected versions, especially those on Windows platforms with console access. Upgrade to the patched versions 11.0.11+, 10.1.45+, or 9.0.109+ without delay. Where immediate upgrade is not feasible, restrict console access to trusted personnel only and disable ANSI escape sequence support in the console if possible. Implement strict monitoring and alerting on Tomcat logs for suspicious input patterns resembling escape sequences. Educate administrators about the risk of social engineering attacks leveraging console manipulation and clipboard injection. Employ endpoint protection solutions that can detect anomalous clipboard activity or command execution attempts. Regularly audit and harden server configurations to minimize attack surface, including limiting user interaction scenarios that could trigger the exploit. Finally, maintain an incident response plan tailored to quickly address any signs of compromise related to this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-08-15T11:26:40.520Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68ffadeaba6dffc5e2050674
Added to database: 10/27/2025, 5:37:46 PM
Last enriched: 12/9/2025, 5:10:02 AM
Last updated: 2/7/2026, 2:45:04 AM
Views: 986
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.