
We found results for “”
CVE-2025-31651
Good to know:


Date: April 28, 2025
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a subset of unlikely rewrite rule configurations, it was possible for a specially crafted request to bypass some rewrite rules. If those rewrite rules effectively enforced security constraints, those constraints could be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.5, from 10.1.0-M1 through 10.1.39, from 9.0.0.M1 through 9.0.102. Users are recommended to upgrade to versions 9.0.104, 10.1.40 or 11.0.6, which fix the issue.
Severity Score
Related Resources (13)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version org.apache.tomcat:tomcat-catalina:9.0.104;org.apache.tomcat:tomcat-catalina:10.1.40;org.apache.tomcat:tomcat-catalina:11.0.6;org.apache.tomcat:tomcat-catalina:9.0.104;org.apache.tomcat:tomcat-catalina:10.1.40;org.apache.tomcat:tomcat-catalina:11.0.6;org.apache.tomcat.embed:tomcat-embed-core:9.0.104;org.apache.tomcat.embed:tomcat-embed-core:10.1.40;org.apache.tomcat.embed:tomcat-embed-core:11.0.6;org.apache.tomcat.embed:tomcat-embed-core:9.0.104;org.apache.tomcat.embed:tomcat-embed-core:10.1.40;org.apache.tomcat.embed:tomcat-embed-core:11.0.6;https://github.com/apache/tomcat.git - 9.0.104;https://github.com/apache/tomcat.git - 10.0.40;https://github.com/apache/tomcat.git - 11.0.6
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |