Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-55754: CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences in Apache Software Foundation Apache Tomcat

0
Critical
VulnerabilityCVE-2025-55754cvecve-2025-55754cwe-150
Published: Mon Oct 27 2025 (10/27/2025, 17:29:50 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 05:37:34 UTC

Technical Analysis

CVE-2025-55754 is a critical security vulnerability classified under CWE-150, which involves improper neutralization of escape, meta, or control sequences in Apache Tomcat. Specifically, Tomcat failed to escape ANSI escape sequences in log messages. When Tomcat runs in a Windows console environment that supports ANSI escape sequences, an attacker can craft a malicious URL that injects these sequences into the logs. This injection can manipulate the console display and clipboard contents, potentially deceiving an administrator into executing commands controlled by the attacker. The vulnerability affects Apache Tomcat versions from 11.0.0-M1 through 11.0.10, 10.1.0-M1 through 10.1.44, and 9.0.40 through 9.0.108, as well as end-of-life versions 8.5.60 through 8.5.100. Although no direct attack vectors have been confirmed on non-Windows systems, the possibility exists. The vulnerability does not require authentication but does require user interaction, such as an administrator viewing the manipulated logs in a vulnerable console. The issue was publicly disclosed on October 27, 2025, with Apache recommending upgrades to versions 11.0.11 or later, 10.1.45 or later, and 9.0.109 or later to remediate the flaw. The CVSS v3.1 score is 9.6 (critical), indicating a high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, no privileges required, user interaction required, and scope changed due to potential command execution.

Potential Impact

The vulnerability poses a significant risk to organizations running affected Apache Tomcat versions on Windows consoles. Successful exploitation can lead to manipulation of the administrator's console and clipboard, potentially tricking them into executing attacker-controlled commands. This can result in full system compromise, data theft, unauthorized access, and disruption of services. Since Tomcat is widely used in enterprise web applications, the impact spans multiple industries including finance, healthcare, government, and technology sectors. The critical CVSS score reflects the potential for complete loss of confidentiality, integrity, and availability. Additionally, the attack requires no privileges, increasing the attack surface. Although no known exploits are currently active, the ease of exploitation and the high impact make this a severe threat. Organizations that do not promptly patch may face targeted attacks leveraging social engineering to escalate privileges or deploy malware.

Mitigation Recommendations

Organizations should immediately upgrade Apache Tomcat to versions 11.0.11 or later, 10.1.45 or later, or 9.0.109 or later to apply the official patches that neutralize ANSI escape sequences in logs. Until upgrades can be performed, administrators should avoid running Tomcat in Windows consoles that support ANSI escape sequences or disable ANSI support in the console environment if possible. Logging configurations should be reviewed to limit exposure to untrusted input in logs. Additionally, administrators should be trained to recognize suspicious console behavior and avoid executing commands based on manipulated log content or clipboard data. Implementing strict access controls and monitoring for unusual command execution patterns can help detect exploitation attempts. Employing endpoint protection solutions that monitor clipboard and console activities may provide additional defense. Regular audits of Tomcat versions and patch levels across the infrastructure are essential to ensure timely remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-08-15T11:26:40.520Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ffadeaba6dffc5e2050674

Added to database: 10/27/2025, 5:37:46 PM

Last enriched: 2/27/2026, 5:37:34 AM

Last updated: 3/25/2026, 3:38:54 AM

Views: 1117

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses