Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@9.0.0.M1
purl pkg:maven/org.apache.tomcat.embed/tomcat-embed-core@9.0.0.M1
Next non-vulnerable version 9.0.107
Latest non-vulnerable version 11.0.21
Risk 10.0
Vulnerabilities affecting this package (20)
Vulnerability Summary Fixed by
VCID-1e6p-cppr-2bh2
Aliases:
CVE-2025-48989
GHSA-gqp3-2cvr-x8m3
Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected. Users are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue.
9.0.108
Affected by 0 other vulnerabilities.
10.1.44
Affected by 0 other vulnerabilities.
11.0.10
Affected by 0 other vulnerabilities.
VCID-1hdb-24e3-f3d6
Aliases:
CVE-2017-5651
GHSA-9hg2-395j-83rm
In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could result in the same Processor being used for multiple requests which in turn could lead to unexpected errors and/or response mix-up.
9.0.0.M19
Affected by 6 other vulnerabilities.
9.0.1
Affected by 22 other vulnerabilities.
VCID-246u-a4rh-yyd4
Aliases:
CVE-2025-49125
GHSA-wc4r-xq3c-5cf3
Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
9.0.106
Affected by 1 other vulnerability.
10.1.42
Affected by 1 other vulnerability.
11.0.8
Affected by 1 other vulnerability.
VCID-39e3-jfbg-s3hk
Aliases:
CVE-2019-10072
GHSA-q4hg-rmq2-52q9
The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS.
9.0.20
Affected by 20 other vulnerabilities.
VCID-43j2-w5xt-43g9
Aliases:
CVE-2024-56337
GHSA-27hp-xhwr-wr2m
9.0.98
Affected by 1 other vulnerability.
10.1.34
Affected by 1 other vulnerability.
11.0.2
Affected by 1 other vulnerability.
VCID-4aaa-errb-2qdw
Aliases:
CVE-2019-0232
GHSA-8vmx-qmch-mpqg
When running on Windows with enableCmdLineArguments enabled, the CGI Servlet in Apache Tomcat 9.0.0.M1 to 9.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 is vulnerable to Remote Code Execution due to a bug in the way the JRE passes command line arguments to Windows. The CGI Servlet is disabled by default. The CGI option enableCmdLineArguments is disable by default in Tomcat 9.0.x (and will be disabled by default in all versions in response to this vulnerability). For a detailed explanation of the JRE behaviour, see Markus Wulftange's blog (https://codewhitesec.blogspot.com/2016/02/java-and-command-line-injections-in-windows.html) and this archived MSDN blog (https://web.archive.org/web/20161228144344/https://blogs.msdn.microsoft.com/twistylittlepassagesallalike/2011/04/23/everyone-quotes-command-line-arguments-the-wrong-way/).
9.0.17
Affected by 22 other vulnerabilities.
VCID-4cag-c4pb-dfaz
Aliases:
CVE-2025-61795
GHSA-hgrr-935x-pq79
Improper Resource Shutdown or Release vulnerability in Apache Tomcat. If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.
9.0.110
Affected by 0 other vulnerabilities.
10.1.47
Affected by 0 other vulnerabilities.
11.0.12
Affected by 0 other vulnerabilities.
VCID-5etb-njwf-rfdu
Aliases:
GHSA-r53m-pfr5-7v87
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core **Withdrawn:** Duplicate of GHSA-qcxh-w3j9-58qr
9.0.16
Affected by 22 other vulnerabilities.
VCID-5sgv-7nsz-5fa8
Aliases:
CVE-2025-24813
GHSA-83qj-6fr2-vhqg
9.0.99
Affected by 1 other vulnerability.
10.1.35
Affected by 1 other vulnerability.
11.0.3
Affected by 1 other vulnerability.
VCID-fpgj-82wf-ykbw
Aliases:
CVE-2025-53506
GHSA-25xr-qj8w-c4vf
Uncontrolled Resource Consumption vulnerability in Apache Tomcat if an HTTP/2 client did not acknowledge the initial settings frame that reduces the maximum permitted concurrent streams. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.
9.0.107
Affected by 0 other vulnerabilities.
10.1.43
Affected by 0 other vulnerabilities.
11.0.9
Affected by 0 other vulnerabilities.
VCID-gb2v-96xj-ybad
Aliases:
CVE-2025-48988
GHSA-h3gc-qfqq-6h8f
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
9.0.106
Affected by 1 other vulnerability.
10.1.42
Affected by 1 other vulnerability.
11.0.8
Affected by 1 other vulnerability.
VCID-hmbm-5ysw-77bu
Aliases:
CVE-2017-5648
GHSA-3vx3-xf6q-r5xp
While investigating bug 60718, it was noticed that some calls to application listeners in Apache Tomcat 9.0.0.M1 to 9.0.0.M17, 8.5.0 to 8.5.11, 8.0.0.RC1 to 8.0.41, and 7.0.0 to 7.0.75 did not use the appropriate facade object. When running an untrusted application under a SecurityManager, it was therefore possible for that untrusted application to retain a reference to the request or response object and thereby access and/or modify information associated with another web application.
9.0.0.M18
Affected by 7 other vulnerabilities.
9.0.1
Affected by 22 other vulnerabilities.
VCID-j6cj-ftyd-3ffa
Aliases:
CVE-2023-41080
GHSA-q3mw-pvr8-9ggc
URL Redirection to Untrusted Site ('Open Redirect') vulnerability in FORM authentication feature Apache Tomcat.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.0.12, from 9.0.0-M1 through 9.0.79 and from 8.5.0 through 8.5.92. Older, EOL versions may also be affected. The vulnerability is limited to the ROOT (default) web application.
9.0.80
Affected by 3 other vulnerabilities.
10.1.13
Affected by 2 other vulnerabilities.
11.0.0-M11
Affected by 3 other vulnerabilities.
VCID-k59r-wjt3-wqe5
Aliases:
CVE-2025-52520
GHSA-wr62-c79q-cv37
For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache Tomcat could lead to a DoS via bypassing of size limits. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.
9.0.107
Affected by 0 other vulnerabilities.
10.1.43
Affected by 0 other vulnerabilities.
11.0.9
Affected by 0 other vulnerabilities.
VCID-n3zn-tuck-gkfe
Aliases:
CVE-2018-8014
GHSA-r4x2-3cq5-hqvp
The defaults settings for the CORS filter provided in Apache Tomcat 9.0.0.M1 to 9.0.8, 8.5.0 to 8.5.31, 8.0.0.RC1 to 8.0.52, 7.0.41 to 7.0.88 are insecure and enable 'supportsCredentials' for all origins. It is expected that users of the CORS filter will have configured it appropriately for their environment rather than using it in the default configuration. Therefore, it is expected that most users will not be impacted by this issue.
9.0.9
Affected by 1 other vulnerability.
VCID-sr8e-w1qk-r7fz
Aliases:
CVE-2025-46701
GHSA-h2fw-rfh5-95r3
Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.
9.0.105
Affected by 3 other vulnerabilities.
10.1.41
Affected by 3 other vulnerabilities.
11.0.7
Affected by 3 other vulnerabilities.
VCID-v7tp-1t4h-zqeg
Aliases:
CVE-2023-28708
GHSA-2c9m-w27f-53rm
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected.
9.0.72
Affected by 5 other vulnerabilities.
10.1.6
Affected by 4 other vulnerabilities.
11.0.0
Affected by 2 other vulnerabilities.
VCID-v8ku-sjc8-wfga
Aliases:
CVE-2024-50379
GHSA-5j33-cvvr-w245
9.0.98
Affected by 1 other vulnerability.
10.1.34
Affected by 1 other vulnerability.
11.0.2
Affected by 1 other vulnerability.
VCID-vdnj-sqmx-e3ep
Aliases:
CVE-2017-12617
GHSA-xjgh-84hx-56c5
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
9.0.1
Affected by 22 other vulnerabilities.
VCID-vsdf-4tfj-uybe
Aliases:
CVE-2024-24549
GHSA-7w75-32cg-r6g2
Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.
9.0.86
Affected by 1 other vulnerability.
10.1.19
Affected by 1 other vulnerability.
11.0.0-M17
Affected by 2 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T23:33:00.769814+00:00 GitLab Importer Affected by VCID-fpgj-82wf-ykbw https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2025-53506.yml 38.4.0
2026-04-16T22:53:54.798800+00:00 GitLab Importer Affected by VCID-vsdf-4tfj-uybe https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2024-24549.yml 38.4.0
2026-04-16T22:36:55.022736+00:00 GitLab Importer Affected by VCID-j6cj-ftyd-3ffa https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2023-41080.yml 38.4.0
2026-04-16T22:24:25.922196+00:00 GitLab Importer Affected by VCID-v7tp-1t4h-zqeg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2023-28708.yml 38.4.0
2026-04-16T20:55:42.959396+00:00 GitLab Importer Affected by VCID-39e3-jfbg-s3hk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2019-10072.yml 38.4.0
2026-04-16T01:28:34.472638+00:00 GHSA Importer Affected by VCID-5etb-njwf-rfdu https://github.com/advisories/GHSA-r53m-pfr5-7v87 38.4.0
2026-04-12T00:52:59.217296+00:00 GitLab Importer Affected by VCID-fpgj-82wf-ykbw https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2025-53506.yml 38.3.0
2026-04-12T00:12:18.847913+00:00 GitLab Importer Affected by VCID-vsdf-4tfj-uybe https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2024-24549.yml 38.3.0
2026-04-11T23:56:12.932668+00:00 GitLab Importer Affected by VCID-j6cj-ftyd-3ffa https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2023-41080.yml 38.3.0
2026-04-11T23:42:36.628720+00:00 GitLab Importer Affected by VCID-v7tp-1t4h-zqeg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2023-28708.yml 38.3.0
2026-04-11T22:06:43.244732+00:00 GitLab Importer Affected by VCID-39e3-jfbg-s3hk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2019-10072.yml 38.3.0
2026-04-11T12:57:53.073979+00:00 GHSA Importer Affected by VCID-5etb-njwf-rfdu https://github.com/advisories/GHSA-r53m-pfr5-7v87 38.3.0
2026-04-07T04:58:26.093532+00:00 GHSA Importer Affected by VCID-1e6p-cppr-2bh2 https://github.com/advisories/GHSA-gqp3-2cvr-x8m3 38.1.0
2026-04-07T04:58:11.578675+00:00 GHSA Importer Affected by VCID-fpgj-82wf-ykbw https://github.com/advisories/GHSA-25xr-qj8w-c4vf 38.1.0
2026-04-07T04:58:11.149005+00:00 GHSA Importer Affected by VCID-k59r-wjt3-wqe5 https://github.com/advisories/GHSA-wr62-c79q-cv37 38.1.0
2026-04-07T04:58:04.661221+00:00 GHSA Importer Affected by VCID-246u-a4rh-yyd4 https://github.com/advisories/GHSA-wc4r-xq3c-5cf3 38.1.0
2026-04-07T04:58:03.982374+00:00 GHSA Importer Affected by VCID-gb2v-96xj-ybad https://github.com/advisories/GHSA-h3gc-qfqq-6h8f 38.1.0
2026-04-07T04:57:53.609975+00:00 GHSA Importer Affected by VCID-sr8e-w1qk-r7fz https://github.com/advisories/GHSA-h2fw-rfh5-95r3 38.1.0
2026-04-07T04:57:13.194473+00:00 GHSA Importer Affected by VCID-5sgv-7nsz-5fa8 https://github.com/advisories/GHSA-83qj-6fr2-vhqg 38.1.0
2026-04-07T04:56:41.572443+00:00 GHSA Importer Affected by VCID-43j2-w5xt-43g9 https://github.com/advisories/GHSA-27hp-xhwr-wr2m 38.1.0
2026-04-07T04:56:38.788047+00:00 GHSA Importer Affected by VCID-v8ku-sjc8-wfga https://github.com/advisories/GHSA-5j33-cvvr-w245 38.1.0
2026-04-04T14:30:15.549767+00:00 GHSA Importer Affected by VCID-vdnj-sqmx-e3ep https://github.com/advisories/GHSA-xjgh-84hx-56c5 38.1.0
2026-04-03T01:01:08.576668+00:00 GitLab Importer Affected by VCID-fpgj-82wf-ykbw https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2025-53506.yml 38.1.0
2026-04-03T00:18:40.187988+00:00 GitLab Importer Affected by VCID-vsdf-4tfj-uybe https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2024-24549.yml 38.1.0
2026-04-02T23:59:17.578021+00:00 GitLab Importer Affected by VCID-j6cj-ftyd-3ffa https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2023-41080.yml 38.1.0
2026-04-02T23:46:30.645668+00:00 GitLab Importer Affected by VCID-v7tp-1t4h-zqeg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2023-28708.yml 38.1.0
2026-04-02T22:19:33.425776+00:00 GitLab Importer Affected by VCID-39e3-jfbg-s3hk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2019-10072.yml 38.1.0
2026-04-02T13:50:11.148095+00:00 GHSA Importer Affected by VCID-5etb-njwf-rfdu https://github.com/advisories/GHSA-r53m-pfr5-7v87 38.1.0
2026-04-02T12:41:41.602087+00:00 GitLab Importer Affected by VCID-fpgj-82wf-ykbw https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2025-53506.yml 38.0.0
2026-04-01T18:09:43.467436+00:00 GitLab Importer Affected by VCID-v7tp-1t4h-zqeg https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2023-28708.yml 38.0.0
2026-04-01T16:07:00.077382+00:00 GHSA Importer Affected by VCID-4cag-c4pb-dfaz https://github.com/advisories/GHSA-hgrr-935x-pq79 38.0.0
2026-04-01T16:01:40.732619+00:00 GHSA Importer Affected by VCID-1hdb-24e3-f3d6 https://github.com/advisories/GHSA-9hg2-395j-83rm 38.0.0
2026-04-01T16:01:28.297072+00:00 GHSA Importer Affected by VCID-hmbm-5ysw-77bu https://github.com/advisories/GHSA-3vx3-xf6q-r5xp 38.0.0
2026-04-01T15:57:33.586050+00:00 GHSA Importer Affected by VCID-39e3-jfbg-s3hk https://github.com/advisories/GHSA-q4hg-rmq2-52q9 38.0.0
2026-04-01T15:57:26.208365+00:00 GHSA Importer Affected by VCID-5etb-njwf-rfdu https://github.com/advisories/GHSA-r53m-pfr5-7v87 38.0.0
2026-04-01T15:57:25.920597+00:00 GHSA Importer Affected by VCID-4aaa-errb-2qdw https://github.com/advisories/GHSA-8vmx-qmch-mpqg 38.0.0
2026-04-01T15:56:56.477475+00:00 GHSA Importer Affected by VCID-n3zn-tuck-gkfe https://github.com/advisories/GHSA-r4x2-3cq5-hqvp 38.0.0
2026-04-01T12:48:32.838475+00:00 GitLab Importer Affected by VCID-39e3-jfbg-s3hk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2019-10072.yml 38.0.0