CVE-2026-34500
CLIENT_CERT Authentication Bypass in Apache Tomcat FFM Component
Publication date: 2026-04-09
Last updated on: 2026-04-14
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | tomcat | 11.0.0 |
| apache | tomcat | 11.0.0 |
| apache | tomcat | 11.0.0 |
| apache | tomcat | 11.0.0 |
| apache | tomcat | 11.0.0 |
| apache | tomcat | 11.0.0 |
| apache | tomcat | 11.0.0 |
| apache | tomcat | 11.0.0 |
| apache | tomcat | 11.0.0 |
| apache | tomcat | 11.0.0 |
| apache | tomcat | 11.0.0 |
| apache | tomcat | 11.0.0 |
| apache | tomcat | 11.0.0 |
| apache | tomcat | From 10.1.22 (inc) to 10.1.54 (exc) |
| apache | tomcat | From 11.0.1 (inc) to 11.0.21 (exc) |
| apache | tomcat | From 9.0.92 (inc) to 9.0.117 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in Apache Tomcat's CLIENT_CERT authentication mechanism. Specifically, when soft fail is disabled and FFM (Forwarded For Module) is used, the authentication does not fail as expected in certain scenarios. This means that the system might incorrectly accept or process client certificates, potentially bypassing intended authentication checks.
How can this vulnerability impact me? :
The impact of this vulnerability is that unauthorized users might be able to bypass CLIENT_CERT authentication under certain conditions. This could lead to unauthorized access to systems or data protected by Apache Tomcat, potentially compromising security.
What immediate steps should I take to mitigate this vulnerability?
Users are recommended to upgrade Apache Tomcat to versions 11.0.21, 10.1.54, or 9.0.117, which fix the CLIENT_CERT authentication issue.