
We found results for “”
CVE-2025-31650
Good to know:


Date: April 28, 2025
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.
Severity Score
Related Resources (18)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version org.apache.tomcat:tomcat-coyote:9.0.104;org.apache.tomcat:tomcat-coyote:10.0.40;org.apache.tomcat:tomcat-coyote:11.0.6;org.apache.tomcat:tomcat-coyote:9.0.104;org.apache.tomcat:tomcat-coyote:10.1.40;org.apache.tomcat:tomcat-coyote:11.0.6;org.apache.tomcat.embed:tomcat-embed-core:9.0.104;org.apache.tomcat.embed:tomcat-embed-core:10.0.40;org.apache.tomcat.embed:tomcat-embed-core:11.0.6;org.apache.tomcat.embed:tomcat-embed-core:9.0.104;org.apache.tomcat.embed:tomcat-embed-core:10.1.40;org.apache.tomcat.embed:tomcat-embed-core:11.0.6;https://github.com/apache/tomcat.git - 9.0.104;https://github.com/apache/tomcat.git - 10.0.40;https://github.com/apache/tomcat.git - 11.0.6
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | NONE |
Availability (A): | HIGH |