CVE-2025-49125

Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.

Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
apacheCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 15%
VendorProductVersion
apachetomcat
9.0.0 ≤
𝑥
< 9.0.106
apachetomcat
10.1.0 ≤
𝑥
< 10.1.42
apachetomcat
11.0.0 ≤
𝑥
< 11.0.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tomcat10
bookworm
vulnerable
bookworm (security)
vulnerable
trixie
vulnerable
sid
vulnerable
tomcat11
trixie
vulnerable
sid
vulnerable
tomcat9
bullseye
vulnerable
bullseye (security)
9.0.107-0+deb11u1
fixed
bookworm
9.0.70-2
fixed
trixie
9.0.95-1
fixed
sid
9.0.95-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tomcat10
plucky
needs-triage
oracular
ignored
noble
needs-triage
jammy
dne
tomcat11
plucky
dne
oracular
dne
noble
dne
jammy
dne
tomcat9
plucky
not-affected
oracular
not-affected
noble
not-affected
jammy
needs-triage
focal
needs-triage
bionic
needs-triage