Security
Aug 4, 2025

10 Tomcat CVEs to Watch Out for in 2025 (Patched by HeroDevs NES)

From RCE to DoS, these 2025 Apache Tomcat vulnerabilities target versions still widely used in production. HeroDevs NES neutralizes the threat.

Summarize with AI
10 Tomcat CVEs to Watch Out for in 2025 (Patched by HeroDevs NES)
For Qualys admins, NES for .NET directly resolves the EOL/Obsolete Software:   Microsoft .NET Version 6 Detected vulnerability, ensuring your systems remain secure and compliant. Fill out the form to get pricing details and learn more.

Research shows these vulnerabilities impacted widely‑used versions of  Tomcat—many on your production path. Here’s what you should know:

1. CVE-2025‑24813 – Partial PUT Remote Code Execution (RCE)  

Critical Severity

If Tomcat’s default servlet write was enabled along with partial PUT, attackers could overwrite or inject code into sensitive files, potentially triggering RCE. Affects 11.0.0‑M1 to 11.0.2. 

Patched in:

2. CVE-2025-31651 – Improper Neutralization of Escape, Meta, or Control Sequences Vulnerability (Command Injection)

Critical Severity

A vulnerability in  Tomcat’s RewriteRule allows attackers to bypass security mechanisms by exploiting improperly handled characters like ; or ?. This can lead to unauthorized access to protected resources. Affects: 9.0.76 – 9.0.103, 10.1.10 – 10.1.39, 11.0.0-M2 – 11.0.5


Patched in:

3. CVE-2025‑31650 – HTTP/2 Priority Header Memory Leak (DoS) 

High Severity

Improper input handling when processing malformed HTTP/2 priority headers can trigger memory leaks, leading to OutOfMemory errors and service outages. Affects Tomcat versions 9.0.76–9.0.102, 10.1.10–10.1.39, 11.0.0‑M2–11.0.5


Patched in:

4. CVE-2025-46701 – Improper Handling of Case Sensitivity in CGI Servlet (Path Traversal)

High Severity

A vulnerability in  Tomcat’s CGI servlet allows attackers to bypass security constraints by exploiting inconsistencies in case sensitivity when accessing URI components. This can lead to unauthorized access to sensitive resources. Affects: 9.0.0-M1 – 9.0.104, 10.1.0-M1 – 10.1.40, 11.0.0-M1 – 11.0.6

Patched in:

5. CVE-2025‑48988 – Multipart Upload DoS via Part Count (DoS)

High Severity

Tomcat used the same limit for both parts and headers, allowing crafted uploads with excessive parts to degrade memory. Affects 11.0.0‑M1 to 11.0.7. 

Patched in:

6. CVE-2025‑49124 – Windows Installer Path Side‑Loading (Path Traversal)

High Severity

On Windows, using icacls.exe without a full path created a side-loading vulnerability during installation. Affects versions 11.0.0‑M1 to 11.0.7. 

Patched in:

7. CVE-2025‑49125 – Pre/Post‑Resources Path Bypass (Authorization Bypass)

Medium Severity

Uncommon resource mount configurations allowed a bypass of security constraints—impacting versions up to 11.0.7. 

Patched in:

8. CVE-2025‑52434 – APR/native Connector DoS via Memory Fault (DoS)

Medium Severity

A flaw in  Tomcat’s APR/native connector could be abused to exhaust service memory, causing downtime.

Patched in:

9. CVE-2025‑52520 – Multipart Request Size Tracking Error (DoS)

Medium Severity

Tomcat improperly managed multipart request size tracking, allowing attackers to overflow memory limits. Fixed in NES 8.5.102 docs.herodevs.com.

Patched in:

10. CVE-2025‑53506 – HTTP/2 Stream Limit (DoS)

Medium Severity

Failing to enforce initial connection limits opened the door to DoS via too many unacknowledged HTTP/2 streams. 

Patched in:

Table of Contents
Author
HeroDevs
Thought Leadership
Open Source Insights Delivered Monthly