CVE-2026-32990

NameCVE-2026-32990
DescriptionImproper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614. This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115. Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1133356, 1133357

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
tomcat10 (PTS)bookworm10.1.34-0+deb12u2vulnerable
bookworm (security)10.1.52-1~deb12u1vulnerable
trixie (security), trixie10.1.52-1~deb13u1vulnerable
forky, sid10.1.54-1fixed
tomcat11 (PTS)trixie (security), trixie11.0.15-1~deb13u1vulnerable
forky, sid11.0.21-1fixed
tomcat9 (PTS)bullseye9.0.43-2~deb11u10vulnerable
bullseye (security)9.0.107-0+deb11u2fixed
bookworm9.0.70-2fixed
trixie9.0.95-1fixed
forky, sid9.0.115-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
tomcat10source(unstable)10.1.54-11133356
tomcat11source(unstable)11.0.21-11133357
tomcat9source(unstable)9.0.70-2

Notes

Starting with 9.0.70-2 src:tomcat9 no longer ships the server stack, using that as the fixed version
Fixed by: https://github.com/apache/tomcat/commit/021d1f833e38b683a44688f7b28f1f27e8e37c36 (11.0.19)
Fixed by: https://github.com/apache/tomcat/commit/4d0615a5c718c260d6d4e0b944a050f09a490c02 (10.1.53)
Fixed by: https://github.com/apache/tomcat/commit/95f7778248cac46d03e6af04de9c72a598be3a53 (9.0.116)
https://www.openwall.com/lists/oss-security/2026/04/09/25

Search for package or bug name: Reporting problems