View all vulnerabilities

CVE-2025-46701

Apache Tomcat - CGI security constraint bypass

Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.

Patch Available

Fix available through Seal Security. No upgrade required, protect your application instantly.

Fix without upgrading
Vulnerability Details
Score
5.3
Score Vector
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
Affected Versions
org.apache.tomcat:tomcat-catalina >= 9.0.0.M1 < 9.0.105; org.apache.tomcat:tomcat-catalina >= 10.1.0-M1 < 10.1.41; org.apache.tomcat:tomcat-catalina >= 11.0.0-M1 < 11.0.7; org.apache.tomcat.embed:tomcat-embed-core >= 9.0.0.M1 < 9.0.105; org.apache.tomcat.embed:tomcat-embed-core >= 10.1.0-M1 < 10.1.41; org.apache.tomcat.embed:tomcat-embed-core >= 11.0.0-M1 < 11.0.7; org.apache.tomcat:tomcat-catalina >= 8.5.0; org.apache.tomcat.embed:tomcat-embed-core >= 8.5.0
Severity
Medium
Ecosystem
Publish Date
May 29, 2025
Modified Date
August 8, 2025