Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Apache Tomcat Security Vulnerabilities Expose Servers to Remote Code Execution Attacks

Posted on October 28, 2025October 28, 2025 By CWS

The Apache Software program Basis has highlighted important flaws in Apache Tomcat, a extensively used open-source Java servlet container that powers quite a few net purposes.

On October 27, 2025, Apache disclosed two vulnerabilities, CVE-2025-55752 and CVE-2025-55754, affecting a number of variations of Tomcat.

Whereas the primary poses a danger of distant code execution (RCE) beneath particular configurations, the second allows potential console manipulation, underscoring the necessity for instant patching in enterprise environments.

These points stem from regressions and unescaped sequences, probably exposing servers to unauthorized entry and management.​

Listing Traversal Flaw Allows RCE

The extra extreme vulnerability, CVE-2025-55752, includes a listing traversal bug launched within the repair for an earlier difficulty (bug 60013).

On this regression, rewritten URLs are normalized earlier than decoding, permitting attackers to control question parameters and bypass protections for delicate directories like /WEB-INF/ and /META-INF/.

If PUT requests are enabled, a configuration usually restricted to trusted customers, malicious information may be uploaded, resulting in RCE.

Found by Chumy Tsai of CyCraft Expertise, this flaw is rated as Vital severity, emphasizing its potential impression on unpatched methods working Tomcat in manufacturing.​

Affected variations embrace Apache Tomcat 11.0.0-M1 to 11.0.10, 10.1.0-M1 to 10.1.44, and 9.0.0-M11 to 9.0.108, with older end-of-life (EOL) releases additionally susceptible.

The technical specifics revolve round URL rewriting guidelines that inadvertently enable path manipulation, exploiting the order of normalization and decoding processes to evade safety constraints.​

CVE IDSeverityAffected VersionsCVSS ScoreTechnical DescriptionCreditCVE-2025-55752Important11.0.0-M1 to 11.0.1010.1.0-M1 to 10.1.449.0.0.M11 to 9.0.108N/A (Vital)Listing traversal through rewritten URL normalization earlier than decoding; allows file add and RCE if PUT enabled. Bypasses /WEB-INF/ and /META-INF/ protections.Chumy Tsai (CyCraft) lists.apache​

​

Console Manipulation By Log Escapes

Along with the traversal difficulty, CVE-2025-55754 addresses improper neutralization of ANSI escape sequences in Tomcat’s log messages.

On Home windows methods with ANSI-supporting consoles, attackers might craft URLs to inject sequences that manipulate the console show, clipboard, and even trick directors into executing instructions.

Though no direct assault vector was recognized for different OSes, the potential for social engineering stays a priority. Rated Low severity, this flaw impacts Tomcat 11.0.0-M1 to 11.0.10, 10.1.0-M1 to 10.1.44, and 9.0.0.40 to 9.0.108, plus choose EOL variations like 8.5.60 to eight.5.100.​

Recognized by Elysee Franchuk of MOBIA Expertise Improvements, the difficulty arises from unescaped logs, permitting management sequences to affect terminal conduct with out authentication.​

CVE IDSeverityAffected VersionsCVSS ScoreTechnical DescriptionCreditCVE-2025-55754Low11.0.0-M1 to 11.0.1010.1.0-M1 to 10.1.449.0.0.40 to 9.0.108N/A (Low)Unescaped ANSI sequences in logs allow console/clipboard manipulation on Home windows; potential command trickery through crafted URLs.Elysee Franchuk (MOBIA) lists.apache​

Specialists word that whereas much less important, combining this with different flaws might amplify threats in console-monitored setups.​

Mitigations

Apache urges customers to improve to mitigated variations: Tomcat 11.0.11, 10.1.45, or 9.0.109 and later, which handle each vulnerabilities via enhanced URL dealing with and log escaping.

Organizations ought to audit configurations, significantly these enabling PUT requests alongside rewrites, to forestall RCE chains. Given Tomcat’s prevalence in Java-based purposes, unpatched situations might face focused assaults, echoing earlier exploits like CVE-2025-24813.​

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Apache, Attacks, Code, Execution, Expose, Remote, Security, Servers, Tomcat, Vulnerabilities

Post navigation

Previous Post: 81% Router Usres Have Not Changed Default Admin Passwords, Exposing Devices to Hackers
Next Post: SideWinder Adopts New ClickOnce-Based Attack Chain Targeting South Asian Diplomats

Related Posts

Critical WordPress Plugin Vulnerability Exposes 10K+ Sites to Cyber Attack Cyber Security News
OpenPGP.js Vulnerability Let Attackers Spoof Message Signature Verification Cyber Security News
Top 10 Best Autonomous Endpoint Management Tools in 2025 Cyber Security News
Prometei Botnet Attacking Linux Servers to Mine Cryptocurrency Cyber Security News
How Winning SOCs Always Stay Ahead of Threats  Cyber Security News
Microsoft 365 Outage Blocks Access to Teams, Exchange Online, and Admin Center Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • QNAP NetBak PC Agent Affected by Recent ASP.NET Core Vulnerability
  • SimSpace Raises $39 Million for Cyber Range Platform
  • Water Saci Hackers Leverage WhatsApp to Deliver Multi-Vector Persistent SORVEPOTEL Malware
  • Ubuntu’s Kernel Vulnerability Let Attackers Escalate Privileges and Gain Root Access
  • Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • QNAP NetBak PC Agent Affected by Recent ASP.NET Core Vulnerability
  • SimSpace Raises $39 Million for Cyber Range Platform
  • Water Saci Hackers Leverage WhatsApp to Deliver Multi-Vector Persistent SORVEPOTEL Malware
  • Ubuntu’s Kernel Vulnerability Let Attackers Escalate Privileges and Gain Root Access
  • Open-Source Firewall IPFire 2.29 With New Reporting For Intrusion Prevention System

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News