Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.tomcat/tomcat@8.5.100
purl pkg:maven/org.apache.tomcat/tomcat@8.5.100
Next non-vulnerable version 9.0.117
Latest non-vulnerable version 11.0.21
Risk 4.3
Vulnerabilities affecting this package (5)
Vulnerability Summary Fixed by
VCID-4cag-c4pb-dfaz
Aliases:
CVE-2025-61795
GHSA-hgrr-935x-pq79
Improper Resource Shutdown or Release vulnerability in Apache Tomcat. If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.
9.0.110
Affected by 1 other vulnerability.
10.1.47
Affected by 1 other vulnerability.
11.0.12
Affected by 1 other vulnerability.
VCID-cfhw-vmcp-y3bc
Aliases:
CVE-2025-55754
GHSA-vfww-5hm6-hx2j
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
9.0.109
Affected by 2 other vulnerabilities.
10.1.45
Affected by 1 other vulnerability.
11.0.11
Affected by 2 other vulnerabilities.
VCID-g7bk-891a-uufy
Aliases:
CVE-2018-1305
GHSA-jx6h-3fjx-cgv5
Security constraints defined by annotations of Servlets in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 were only applied once a Servlet had been loaded. Because security constraints defined in this way apply to the URL pattern and any URLs below that point, it was possible - depending on the order Servlets were loaded - for some security constraints not to be applied. This could have exposed resources to users who were not authorised to access them.
9.0.5
Affected by 24 other vulnerabilities.
VCID-xqjr-7xfw-mbh2
Aliases:
CVE-2025-55752
GHSA-wmwf-9ccg-fff5
Relative Path Traversal vulnerability in Apache Tomcat. The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
9.0.109
Affected by 2 other vulnerabilities.
10.1.45
Affected by 1 other vulnerability.
11.0.11
Affected by 2 other vulnerabilities.
VCID-yrzk-1dbk-muhy
Aliases:
CVE-2026-29146
GHSA-h468-7pvh-8vr8
9.0.116
Affected by 5 other vulnerabilities.
9.0.117
Affected by 0 other vulnerabilities.
10.1.53
Affected by 5 other vulnerabilities.
10.1.54
Affected by 0 other vulnerabilities.
11.0.19
Affected by 2 other vulnerabilities.
11.0.20
Affected by 5 other vulnerabilities.
11.0.21
Affected by 0 other vulnerabilities.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T20:41:45.763072+00:00 GitLab Importer Affected by VCID-g7bk-891a-uufy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2018-1305.yml 38.4.0
2026-04-16T07:45:50.412300+00:00 GHSA Importer Affected by VCID-yrzk-1dbk-muhy https://github.com/advisories/GHSA-h468-7pvh-8vr8 38.4.0
2026-04-11T21:52:21.675160+00:00 GitLab Importer Affected by VCID-g7bk-891a-uufy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2018-1305.yml 38.3.0
2026-04-02T22:06:08.530417+00:00 GitLab Importer Affected by VCID-g7bk-891a-uufy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2018-1305.yml 38.1.0
2026-04-01T16:23:07.259372+00:00 GitLab Importer Affected by VCID-g7bk-891a-uufy https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.tomcat/tomcat/CVE-2018-1305.yml 38.0.0
2026-04-01T16:07:01.086801+00:00 GHSA Importer Affected by VCID-xqjr-7xfw-mbh2 https://github.com/advisories/GHSA-wmwf-9ccg-fff5 38.0.0
2026-04-01T16:07:00.682150+00:00 GHSA Importer Affected by VCID-cfhw-vmcp-y3bc https://github.com/advisories/GHSA-vfww-5hm6-hx2j 38.0.0
2026-04-01T16:07:00.298261+00:00 GHSA Importer Affected by VCID-4cag-c4pb-dfaz https://github.com/advisories/GHSA-hgrr-935x-pq79 38.0.0