Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66614: CWE-20 Improper Input Validation in Apache Software Foundation Apache Tomcat

0
Unknown
VulnerabilityCVE-2025-66614cvecve-2025-66614cwe-20
Published: Tue Feb 17 2026 (02/17/2026, 18:48:30 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Tomcat

Description

Improper Input Validation vulnerability. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected. Tomcat did not validate that the host name provided via the SNI extension was the same as the host name provided in the HTTP host header field. If Tomcat was configured with more than one virtual host and the TLS configuration for one of those hosts did not require client certificate authentication but another one did, it was possible for a client to bypass the client certificate authentication by sending different host names in the SNI extension and the HTTP host header field. The vulnerability only applies if client certificate authentication is only enforced at the Connector. It does not apply if client certificate authentication is enforced at the web application. Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue.

AI-Powered Analysis

AILast updated: 02/18/2026, 08:23:45 UTC

Technical Analysis

CVE-2025-66614 is a security vulnerability classified under CWE-20 (Improper Input Validation) affecting multiple versions of Apache Tomcat, specifically from 8.5.0 through 11.0.14. The root cause lies in Tomcat's failure to validate that the hostname provided in the TLS Server Name Indication (SNI) extension matches the hostname specified in the HTTP Host header. In environments where Tomcat is configured with multiple virtual hosts, some requiring client certificate authentication at the TLS Connector level and others not, this mismatch can be exploited. An attacker can send a TLS ClientHello with an SNI hostname that corresponds to a virtual host without client certificate requirements, while the HTTP Host header references a virtual host that normally requires client certificates. Because Tomcat does not cross-verify these hostnames, it may allow the connection to bypass client certificate authentication checks, effectively granting unauthorized access. This vulnerability only applies when client certificate authentication is enforced at the Connector level; if enforced at the web application level, the vulnerability does not apply. There are no known exploits in the wild as of the publication date. The issue was addressed in Apache Tomcat versions 11.0.15, 10.1.50, and 9.0.113 and later, which implement proper hostname validation between SNI and HTTP Host headers. Organizations using affected Tomcat versions with multi-host TLS configurations and client certificate authentication should prioritize upgrading to these fixed versions to prevent potential unauthorized access.

Potential Impact

For European organizations, the impact of CVE-2025-66614 can be significant, especially for those deploying Apache Tomcat in environments requiring strong client authentication, such as financial institutions, government agencies, and critical infrastructure providers. The vulnerability enables attackers to bypass client certificate authentication, potentially allowing unauthorized users to access sensitive applications or data protected by TLS client certificates. This undermines the confidentiality and integrity of communications and may lead to data breaches, unauthorized transactions, or lateral movement within networks. Organizations relying on multi-tenant or multi-virtual host Tomcat deployments are particularly at risk. The absence of known exploits reduces immediate risk, but the vulnerability's presence in widely used Tomcat versions means that attackers could develop exploits in the future. Given the critical role of client certificate authentication in securing access, this vulnerability could also impact compliance with European data protection regulations such as GDPR if unauthorized access leads to personal data exposure.

Mitigation Recommendations

1. Upgrade Apache Tomcat to the fixed versions: 11.0.15 or later, 10.1.50 or later, or 9.0.113 or later. This is the primary and most effective mitigation. 2. Review and, if possible, enforce client certificate authentication at the web application level rather than solely at the Connector level, as this vulnerability does not apply in that scenario. 3. Audit TLS configurations to ensure that virtual hosts requiring client certificates are properly segregated and that SNI and HTTP Host headers are consistent. 4. Implement network-level controls to restrict access to sensitive virtual hosts and monitor for anomalous TLS handshake behaviors indicative of SNI/Host header mismatches. 5. Employ logging and alerting on TLS handshake failures or unusual client certificate authentication bypass attempts. 6. Conduct penetration testing and vulnerability scanning focused on TLS and client authentication mechanisms to detect potential exploitation attempts. 7. Educate system administrators and developers about the importance of consistent hostname validation in multi-host TLS environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-12-05T11:54:31.778Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699575bd80d747be205377ea

Added to database: 2/18/2026, 8:18:05 AM

Last enriched: 2/18/2026, 8:23:45 AM

Last updated: 2/21/2026, 12:16:01 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats