CVE-2025-49125
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-16

Last updated on: 2025-11-03

Assigner: Apache Software Foundation

Description
Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.Β  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-16
Last Modified
2025-11-03
Generated
2026-05-07
AI Q&A
2025-06-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
apache tomcat From 9.0.0 (inc) to 9.0.106 (exc)
apache tomcat From 10.1.0 (inc) to 10.1.42 (exc)
apache tomcat From 11.0.0 (inc) to 11.0.8 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-288 The product requires authentication, but the product has an alternate path or channel that does not require authentication.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Apache Tomcat allows an attacker to bypass authentication by accessing PreResources or PostResources mounted at locations other than the root of the web application through an unexpected path. This alternate path is likely not protected by the same security constraints as the expected path, enabling the attacker to bypass security controls.


How can this vulnerability impact me? :

The vulnerability can allow unauthorized users to access protected resources within an Apache Tomcat web application by exploiting alternate paths that bypass security constraints. This could lead to unauthorized access to sensitive information or functionality that should be restricted.


What immediate steps should I take to mitigate this vulnerability?

Users are recommended to upgrade Apache Tomcat to version 11.0.8, 10.1.42, or 9.0.106, which fix the issue.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart