CVE-2025-49125

NameCVE-2025-49125
DescriptionAuthentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tomcat10 (PTS)bookworm, bookworm (security)10.1.34-0+deb12u2vulnerable
trixie, sid10.1.40-1vulnerable
tomcat11 (PTS)trixie, sid11.0.6-1vulnerable
tomcat9 (PTS)bullseye9.0.43-2~deb11u10vulnerable
bullseye (security)9.0.43-2~deb11u12vulnerable
bookworm9.0.70-2fixed
trixie, sid9.0.95-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tomcat10source(unstable)(unfixed)
tomcat11source(unstable)(unfixed)
tomcat9source(unstable)9.0.70-2

Notes

Starting with 9.0.70-2 src:tomcat9 no longer ships the server stack, using that as the fixed version
https://lists.apache.org/thread/m66cytbfrty9k7dc4cg6tl1czhsnbywk
https://github.com/apache/tomcat/commit/d94bd36fb7eb32e790dae0339bc249069649a637 (11.0.8)
https://github.com/apache/tomcat/commit/7617b9c247bc77ed0444dd69adcd8aa48777886c (10.1.42)
https://github.com/apache/tomcat/commit/9418e3ff9f1f4c006b4661311ae9376c52d162b9 (9.0.106)

Search for package or bug name: Reporting problems