CVE-2026-25854

NameCVE-2026-25854
DescriptionOccasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100. Other, unsupported versions may also be affected Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1133356, 1133357

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tomcat10 (PTS)bookworm10.1.34-0+deb12u2vulnerable
bookworm (security)10.1.52-1~deb12u1vulnerable
trixie (security), trixie10.1.52-1~deb13u1vulnerable
forky, sid10.1.54-1fixed
tomcat11 (PTS)trixie (security), trixie11.0.15-1~deb13u1vulnerable
forky, sid11.0.21-1fixed
tomcat9 (PTS)bullseye9.0.43-2~deb11u10vulnerable
bullseye (security)9.0.107-0+deb11u2fixed
bookworm9.0.70-2fixed
trixie9.0.95-1fixed
forky, sid9.0.115-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tomcat10source(unstable)10.1.54-11133356
tomcat11source(unstable)11.0.21-11133357
tomcat9source(unstable)9.0.70-2

Notes

Starting with 9.0.70-2 src:tomcat9 no longer ships the server stack, using that as the fixed version
Fixed by: https://github.com/apache/tomcat/commit/4c5d306001b780c9316aea5ff6502c524fb20695 (11.0.19)
Fixed by: https://github.com/apache/tomcat/commit/5fb910f9a9dafa37a0c0965a1bd62a21dcf437f2 (10.1.53)
Fixed by: https://github.com/apache/tomcat/commit/c5a45ae68d07f7a07be2a875e5b6772d66c4e5d0 (9.0.116)
https://www.openwall.com/lists/oss-security/2026/04/09/21

Search for package or bug name: Reporting problems