Tomcat Flaws Expose Servers to DoS, Auth Bypass & Privilege Escalation

1 Star2 Stars3 Stars4 Stars5 Stars (8 votes, average: 5.00 out of 5)
Loading...
Apache Tomcat Vulnerabilities

The most prevalent Java servlet container, Apache Tomcat, is present in most enterprise and cloud-based web applications. Because of its agile, open-source framework, Apache Tomcat is prevalent in many fields of technology.

However, widespread adoption also carries widespread risk.

In June 2025, the Apache Software Foundation reported 4 critical vulnerabilities across Tomcat 9.0, 10.1, and 11.0.

The vulnerabilities represent: Denial-of-Service (DoS), Authentication bypass, Windows privilege escalation, Security constraint violations

Millions of systems, still operating on unpatched versions of Tomcat, are at risk of attack.

This article looks into each of the vulnerabilities, provides an overview of the impact, and explains how you can reduce the security risk on your systems. The final part of the article gives you security patching/resource allocation, and configuration practices to help secure your deployment.

Summary of Flaws

CVE IDSeverityRiskAffected Versions
CVE-2025-48976ImportantDoS via multipart header overload9.0.0.M1–9.0.105, 10.1.0–10.1.41, 11.0.0-M1–11.0.7
CVE-2025-48988ImportantDoS via multipart upload abuse9.0.0.M1–9.0.105, 10.1.0–10.1.41, 11.0.0-M1–11.0.7
CVE-2025-49124LowWindows installer side-loading9.0.23–9.0.105, 10.1.0–10.1.41, 11.0.0-M1–11.0.7
CVE-2025-49125ModerateAuth bypass via Pre/PostResources9.0.23–9.0.105, 10.1.0–10.1.41, 11.0.0-M1–11.0.7

CVE-2025-48976 – Multipart Header Memory Exhaustion

Nature of the Flaw

This vulnerability arises from Apache Commons FileUpload. Tomcat, specifically the FileUpload module, is a widely adopted way of processing file uploads over multipart/form-data.

Problem

The system had a hard-coded restriction of 10kB on each multipart header before the patch. Attackers could:

  • Send thousands of parts per request
  • Force the server to allocate memory for each 10kB header

Real-World Example

  • 1,000 parts x 10kB header = 10MB of allocated memory
  • Thousands of requests = Gigabytes of allocated memory
  • Result: OutOfMemoryError  → server crash

Solution

  • ASF added a configurable parameter:  maxPartHeaderSize(default 512 bytes)

Impact

  • Will prevent excessive memory allocation
  • Gives flexibility to administrators
  • Lowers the probability of memory DoS

CVE-2025-48988 – Multipart Upload Resource Exhaustion

Nature of the Flaw

The vulnerability existed in the Tomcat handling of multipart parts in a file upload.

Problem

  • Tomcat recognized multipart “parts” like any other request parameter.
  • Multipart parts are heavier. They include: Binary file data and Headers that are retained in memory
  • Tomcat used a single limit for both.

Exploitation

  • Attacker sends a multipart request with:
    • 10,000 parts
    • Each part’s header uses 500 bytes
  • The server allocates ~5MB per request
  • The attacker sends many requests simultaneously

Result:

Server memory exhaustion and crash

Solution

  • The ASF added maxPartCount parameter
    • Default: 10 parts
  • Allows administrators to customize file upload handling

CVE-2025-49124 – Windows Installer Side-Loading

Nature of the Flaw

A low-risk, but dangerous vulnerability on Windows systems.

Problem

  • Tomcat installer invoked icacls.exe (used to modify file permissions)
  • It didn’t specify the full path (e.g., C:\Windows\System32\icacls.exe)
  • Relied on system PATH variable

Exploitation

  • Attacker places a fake icacls.exe earlier in the PATH
  • The installer unknowingly executes the attacker’s malicious file

Possible Outcomes:

  • Privilege escalationMalicious services installed

  • Persistence mechanisms embedded

Solution

  • Installer now uses full, absolute path to icacls.exe
  • Prevents PATH manipulation attacks

CVE-2025-49125 – Pre/PostResources Auth Bypass

Nature of the Flaw

This moderate-severity flaw targets advanced Tomcat deployments using resource overlays.

Problem

  • Tomcat allows mounting of additional resources (PreResources/PostResources) outside the app root
  • These resources should be protected by the same security policies
  • Path normalization wasn’t enforced
  • Attackers could request files using alternative paths

Exploitation

Use of unexpected path variants allowed:

  • Bypassing authentication rules

  • Gaining access to protected static content or files

Solution

  • Patch enforces path normalization
  • Ensures consistent security policy enforcement for all resource paths

How These Attacks Work in Practice?

Denial-of-Service (DoS)

Attackers target memory allocation:

  • Send multiple large or complex multipart requests
  • Each request consumes significant memory
  • Servers crash or become unresponsive

Authentication Bypass

  • By manipulating paths, attackers can:
    • Access restricted areas
    • Download sensitive resources
    • Avoid user verification steps

Installer Abuse

  • Used in targeted attacks
  • Threat actors compromise Windows environments
  • Side-load malicious binaries during installation

Technical Exploitation Flow

Attack StageDescriptionTarget Component
ReconnaissanceIdentify vulnerable Tomcat versionWeb Application
Exploit DeliverySend multipart or crafted path requestsConnector / FileUpload
Resource ImpactExhaust memory / bypass controlsJVM / Auth Modules
OutcomeServer crash, auth bypass, persistenceEntire Host System

1. Upgrade Immediately

Version BranchUpgrade To
Tomcat 9.0.x9.0.106
Tomcat 10.1.x10.1.42
Tomcat 11.0.x11.0.8

2. Apply Configuration Hardening

In server.xml, within the <Connector> tag:

<Connector
            …
            maxPartHeaderSize="512"
            maxPartCount="10"
/>

3. Validate PATH Settings (Windows)

  • Ensure no untrusted executables reside in any directory listed in the PATH environment variable.
  • Verify file access rights for installers.

4. Review Pre/Post Resources Configuration

  • Avoid mounting resources outside the root unless essential.
  • Apply strict access controls and test for path bypasses.

Conclusion

The recent Apache Tomcat vulnerabilities—ranging from denial-of-service (DoS) risks to authentication bypass and installer abuse—underscore the critical need for proactive system security.

These flaws, affecting versions 9.0, 10.1, and 11.0, could be exploited to crash servers, bypass security controls, or introduce malicious executables during installation.

Fortunately, the Apache Software Foundation has responded swiftly with patches and configuration options that offer immediate protection.

To strengthen your defense beyond patching, consider using a dedicated security solution like SiteLock. It offers real-time website scanning, daily vulnerability detection, and active protection against threats such as DDoS attacks, malware, SQL injection, and authentication bypass.

Janki Mehta

Janki Mehta

Janki Mehta is a passionate Cyber-Security Enthusiast who keenly monitors the latest developments in the Web/Cyber Security industry. She puts her knowledge into practice and helps web users by arming them with the necessary security measures to stay safe in the digital world.