Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.tomcat/tomcat-catalina@10.1.0-M1
purl pkg:maven/org.apache.tomcat/tomcat-catalina@10.1.0-M1
Next non-vulnerable version 10.1.30
Latest non-vulnerable version 11.0.21
Risk 10.0
Vulnerabilities affecting this package (21)
Vulnerability Summary Fixed by
VCID-246u-a4rh-yyd4
Aliases:
CVE-2025-49125
GHSA-wc4r-xq3c-5cf3
Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
10.1.42
Affected by 0 other vulnerabilities.
11.0.8
Affected by 0 other vulnerabilities.
VCID-2kku-pzer-9ufv
Aliases:
CVE-2025-55668
GHSA-23hv-mwm6-g8jf
Session Fixation vulnerability in Apache Tomcat via rewrite valve. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
10.1.42
Affected by 0 other vulnerabilities.
11.0.8
Affected by 0 other vulnerabilities.
VCID-2rmy-13ym-3bgm
Aliases:
CVE-2026-34483
GHSA-rv64-5gf8-9qq8
10.1.54
Affected by 0 other vulnerabilities.
11.0.21
Affected by 0 other vulnerabilities.
VCID-43j2-w5xt-43g9
Aliases:
CVE-2024-56337
GHSA-27hp-xhwr-wr2m
10.1.34
Affected by 0 other vulnerabilities.
11.0.2
Affected by 0 other vulnerabilities.
VCID-4cag-c4pb-dfaz
Aliases:
CVE-2025-61795
GHSA-hgrr-935x-pq79
Improper Resource Shutdown or Release vulnerability in Apache Tomcat. If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.
10.1.47
Affected by 0 other vulnerabilities.
11.0.12
Affected by 0 other vulnerabilities.
VCID-5sgv-7nsz-5fa8
Aliases:
CVE-2025-24813
GHSA-83qj-6fr2-vhqg
10.1.35
Affected by 0 other vulnerabilities.
11.0.3
Affected by 0 other vulnerabilities.
VCID-8mns-kw6c-a7dk
Aliases:
CVE-2024-52316
GHSA-xcpr-7mr4-h4xq
Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.
10.1.30
Affected by 0 other vulnerabilities.
11.0.1
Affected by 0 other vulnerabilities.
VCID-b3bb-9ajg-sfc9
Aliases:
CVE-2023-46589
GHSA-fccv-jmmp-qg76
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue.
10.1.16
Affected by 1 other vulnerability.
11.0.0-M11
Affected by 1 other vulnerability.
VCID-cfhw-vmcp-y3bc
Aliases:
CVE-2025-55754
GHSA-vfww-5hm6-hx2j
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
10.1.45
Affected by 0 other vulnerabilities.
11.0.11
Affected by 0 other vulnerabilities.
VCID-d1fm-vbd1-n7au
Aliases:
CVE-2026-34487
GHSA-x4m4-345f-5h5g
10.1.54
Affected by 0 other vulnerabilities.
11.0.21
Affected by 0 other vulnerabilities.
VCID-gb2v-96xj-ybad
Aliases:
CVE-2025-48988
GHSA-h3gc-qfqq-6h8f
Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
10.1.42
Affected by 0 other vulnerabilities.
11.0.8
Affected by 0 other vulnerabilities.
VCID-gvhy-d4gm-57d3
Aliases:
CVE-2024-54677
GHSA-653p-vg55-5652
10.1.34
Affected by 0 other vulnerabilities.
11.0.2
Affected by 0 other vulnerabilities.
VCID-gyed-x6s8-ybhr
Aliases:
CVE-2026-24880
GHSA-563x-q5rq-57qp
10.1.52
Affected by 0 other vulnerabilities.
11.0.20
Affected by 1 other vulnerability.
VCID-k59r-wjt3-wqe5
Aliases:
CVE-2025-52520
GHSA-wr62-c79q-cv37
For some unlikely configurations of multipart upload, an Integer Overflow vulnerability in Apache Tomcat could lead to a DoS via bypassing of size limits. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.8, from 10.1.0-M1 through 10.1.42, from 9.0.0.M1 through 9.0.106. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.9, 10.1.43 or 9.0.107, which fix the issue.
10.1.43
Affected by 0 other vulnerabilities.
11.0.9
Affected by 0 other vulnerabilities.
VCID-maw6-4qs5-ykae
Aliases:
CVE-2025-66614
GHSA-fpj8-gq4v-p354
Improper Input Validation vulnerability. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected. Tomcat did not validate that the host name provided via the SNI extension was the same as the host name provided in the HTTP host header field. If Tomcat was configured with more than one virtual host and the TLS configuration for one of those hosts did not require client certificate authentication but another one did, it was possible for a client to bypass the client certificate authentication by sending different host names in the SNI extension and the HTTP host header field. The vulnerability only applies if client certificate authentication is only enforced at the Connector. It does not apply if client certificate authentication is enforced at the web application. Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue.
10.1.50
Affected by 2 other vulnerabilities.
11.0.15
Affected by 1 other vulnerability.
VCID-sr8e-w1qk-r7fz
Aliases:
CVE-2025-46701
GHSA-h2fw-rfh5-95r3
Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.
10.1.41
Affected by 2 other vulnerabilities.
11.0.7
Affected by 2 other vulnerabilities.
VCID-v7tp-1t4h-zqeg
Aliases:
CVE-2023-28708
GHSA-2c9m-w27f-53rm
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected.
10.1.6
Affected by 2 other vulnerabilities.
11.0.0-M3
Affected by 1 other vulnerability.
VCID-v8ku-sjc8-wfga
Aliases:
CVE-2024-50379
GHSA-5j33-cvvr-w245
10.1.34
Affected by 0 other vulnerabilities.
11.0.2
Affected by 0 other vulnerabilities.
VCID-xqjr-7xfw-mbh2
Aliases:
CVE-2025-55752
GHSA-wmwf-9ccg-fff5
Relative Path Traversal vulnerability in Apache Tomcat. The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
10.1.45
Affected by 0 other vulnerabilities.
11.0.11
Affected by 0 other vulnerabilities.
VCID-y9ne-rw7e-vugf
Aliases:
CVE-2026-24733
GHSA-qq5r-98hh-rxc9
Improper Input Validation vulnerability in Apache Tomcat. Tomcat did not limit HTTP/0.9 requests to the GET method. If a security constraint was configured to allow HEAD requests to a URI but deny GET requests, the user could bypass that constraint on GET requests by sending a (specification invalid) HEAD request using HTTP/0.9. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112. Older, EOL versions are also affected. Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.
10.1.50
Affected by 2 other vulnerabilities.
11.0.15
Affected by 1 other vulnerability.
VCID-zw2q-kna8-mqcm
Aliases:
CVE-2026-25854
GHSA-9m3c-qcxr-9x87
10.1.53
Affected by 1 other vulnerability.
11.0.20
Affected by 1 other vulnerability.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T23:14:54.599754+00:00 GitLab Importer Affected by VCID-8mns-kw6c-a7dk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-catalina/CVE-2024-52316.yml 38.4.0
2026-04-13T07:05:08.307387+00:00 GHSA Importer Affected by VCID-2rmy-13ym-3bgm https://github.com/advisories/GHSA-rv64-5gf8-9qq8 38.3.0
2026-04-13T07:05:07.588668+00:00 GHSA Importer Affected by VCID-d1fm-vbd1-n7au https://github.com/advisories/GHSA-x4m4-345f-5h5g 38.3.0
2026-04-13T07:05:06.905814+00:00 GHSA Importer Affected by VCID-zw2q-kna8-mqcm https://github.com/advisories/GHSA-9m3c-qcxr-9x87 38.3.0
2026-04-13T07:05:05.858077+00:00 GHSA Importer Affected by VCID-gyed-x6s8-ybhr https://github.com/advisories/GHSA-563x-q5rq-57qp 38.3.0
2026-04-12T00:33:30.041134+00:00 GitLab Importer Affected by VCID-8mns-kw6c-a7dk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-catalina/CVE-2024-52316.yml 38.3.0
2026-04-07T04:58:26.233948+00:00 GHSA Importer Affected by VCID-2kku-pzer-9ufv https://github.com/advisories/GHSA-23hv-mwm6-g8jf 38.1.0
2026-04-07T04:58:11.362884+00:00 GHSA Importer Affected by VCID-k59r-wjt3-wqe5 https://github.com/advisories/GHSA-wr62-c79q-cv37 38.1.0
2026-04-07T04:58:04.278088+00:00 GHSA Importer Affected by VCID-246u-a4rh-yyd4 https://github.com/advisories/GHSA-wc4r-xq3c-5cf3 38.1.0
2026-04-07T04:58:03.699630+00:00 GHSA Importer Affected by VCID-gb2v-96xj-ybad https://github.com/advisories/GHSA-h3gc-qfqq-6h8f 38.1.0
2026-04-07T04:57:53.786864+00:00 GHSA Importer Affected by VCID-sr8e-w1qk-r7fz https://github.com/advisories/GHSA-h2fw-rfh5-95r3 38.1.0
2026-04-07T04:57:12.991618+00:00 GHSA Importer Affected by VCID-5sgv-7nsz-5fa8 https://github.com/advisories/GHSA-83qj-6fr2-vhqg 38.1.0
2026-04-07T04:56:41.537522+00:00 GHSA Importer Affected by VCID-43j2-w5xt-43g9 https://github.com/advisories/GHSA-27hp-xhwr-wr2m 38.1.0
2026-04-07T04:56:39.361889+00:00 GHSA Importer Affected by VCID-v8ku-sjc8-wfga https://github.com/advisories/GHSA-5j33-cvvr-w245 38.1.0
2026-04-07T04:56:38.957151+00:00 GHSA Importer Affected by VCID-gvhy-d4gm-57d3 https://github.com/advisories/GHSA-653p-vg55-5652 38.1.0
2026-04-07T04:56:27.674047+00:00 GHSA Importer Affected by VCID-8mns-kw6c-a7dk https://github.com/advisories/GHSA-xcpr-7mr4-h4xq 38.1.0
2026-04-03T00:41:13.026963+00:00 GitLab Importer Affected by VCID-8mns-kw6c-a7dk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-catalina/CVE-2024-52316.yml 38.1.0
2026-04-02T17:00:45.677822+00:00 GHSA Importer Affected by VCID-b3bb-9ajg-sfc9 https://github.com/advisories/GHSA-fccv-jmmp-qg76 38.1.0
2026-04-02T16:59:09.153178+00:00 GHSA Importer Affected by VCID-v7tp-1t4h-zqeg https://github.com/advisories/GHSA-2c9m-w27f-53rm 38.1.0
2026-04-02T12:40:25.835432+00:00 GitLab Importer Affected by VCID-8mns-kw6c-a7dk https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat-catalina/CVE-2024-52316.yml 38.0.0
2026-04-01T16:08:00.091047+00:00 GHSA Importer Affected by VCID-maw6-4qs5-ykae https://github.com/advisories/GHSA-fpj8-gq4v-p354 38.0.0
2026-04-01T16:08:00.054277+00:00 GHSA Importer Affected by VCID-y9ne-rw7e-vugf https://github.com/advisories/GHSA-qq5r-98hh-rxc9 38.0.0
2026-04-01T16:07:01.119330+00:00 GHSA Importer Affected by VCID-xqjr-7xfw-mbh2 https://github.com/advisories/GHSA-wmwf-9ccg-fff5 38.0.0
2026-04-01T16:07:00.843133+00:00 GHSA Importer Affected by VCID-4cag-c4pb-dfaz https://github.com/advisories/GHSA-hgrr-935x-pq79 38.0.0
2026-04-01T16:07:00.044180+00:00 GHSA Importer Affected by VCID-cfhw-vmcp-y3bc https://github.com/advisories/GHSA-vfww-5hm6-hx2j 38.0.0