CVE-2025-49125
Publication date 16 June 2025
Last updated 18 June 2025
Ubuntu priority
Cvss 3 Severity Score
Authentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat. When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.
Status
Package | Ubuntu Release | Status |
---|---|---|
tomcat10 | 25.04 plucky |
Needs evaluation
|
24.10 oracular |
Needs evaluation
|
|
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy | Not in release | |
tomcat11 | 25.04 plucky | Not in release |
24.10 oracular | Not in release | |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
tomcat9 | 25.04 plucky |
Not affected
|
24.10 oracular |
Not affected
|
|
24.04 LTS noble |
Not affected
|
|
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Other references
- https://www.cve.org/CVERecord?id=CVE-2025-49125
- https://lists.apache.org/thread/m66cytbfrty9k7dc4cg6tl1czhsnbywk
- https://github.com/apache/tomcat/commit/d94bd36fb7eb32e790dae0339bc249069649a637 (11.0.8)
- https://github.com/apache/tomcat/commit/7617b9c247bc77ed0444dd69adcd8aa48777886c (10.1.42)
- https://github.com/apache/tomcat/commit/9418e3ff9f1f4c006b4661311ae9376c52d162b9 (9.0.106)
- http://www.openwall.com/lists/oss-security/2025/06/16/2