First published: Mon Apr 28 2025(Updated: )
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat. For a subset of unlikely rewrite rule configurations, it was possible for a specially crafted request to bypass some rewrite rules. If those rewrite rules effectively enforced security constraints, those constraints could be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.5, from 10.1.0-M1 through 10.1.39, from 9.0.0.M1 through 9.0.102. Users are recommended to upgrade to version [FIXED_VERSION], which fixes the issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tomcat | >=11.0.0-M1<11.0.5>=10.1.0-M1<10.1.39>=9.0.0.M1<9.0.102 | |
maven/org.apache.tomcat:tomcat-catalina | >=11.0.0-M2<11.0.6 | 11.0.6 |
maven/org.apache.tomcat:tomcat-catalina | >=10.1.10<10.1.40 | 10.1.40 |
maven/org.apache.tomcat:tomcat-catalina | >=9.0.76<=9.0.102 | 9.0.104 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-31651 has been rated as a medium-severity vulnerability due to the specific conditions under which it can be exploited.
To fix CVE-2025-31651, upgrade to Apache Tomcat versions 11.0.6, 10.1.40, or 9.0.103 or later.
CVE-2025-31651 affects Apache Tomcat versions 11.0.0-M1 to 11.0.5, 10.1.0-M1 to 10.1.39, and 9.0.0-M1 to 9.0.102.
CVE-2025-31651 is classified as an Improper Neutralization of Escape, Meta, or Control Sequences vulnerability.
If exploited, CVE-2025-31651 can allow a specially crafted request to bypass certain security measures enforced by rewrite rules.