Apache Releases Security Updates
Proof-of-concept exploit code has been shared publicly for CVE-2025-55752, which could lead to RCE
Summary
Proof-of-concept exploit code has been shared publicly for CVE-2025-55752, which could lead to RCE
Affected platforms
The following platforms are known to be affected:
Threat details
Proof-of-concept exploit code released for CVE-2025-55752
Proof-of-concept (PoC) exploit code has been released publicly and exploitation is considered likely.
Introduction
Apache has released security updates for Tomcat 11, Tomcat 10, and Tomcat 9 to address three security vulnerabilities. Tomcat is an open-source web server and servlet container that is used to deploy and serve Java-based web applications.
-
CVE-2025-55752 is a 'Relative Path Traversal' vulnerability with a CVSSv3 score of 7.5 and given certain conditions, successful exploitation could lead to remote code execution (RCE). Proof-of-concept (PoC) exploit code has been released publicly and exploitation is considered likely.
-
CVE-2025-55754 is an 'Improper Neutralisation of Escape, Meta, or Control Sequences' vulnerability with a CVSSv3 score of 9.6 and successful exploitation could lead to an administrator being tricked into running an attacker-controlled command.
-
CVE-2025-61795 is an 'Improper Resource Shutdown or Release' vulnerability with a CVSSv3 score of 5.3 and successful exploitation could lead to a denial-of-service (DoS) condition.
Remediation advice
Affected organisations are encouraged to review the following advisories and apply the relevant updates as soon as possible.
Remediation steps
| Type | Step |
|---|---|
| Guidance |
Update to Apache Tomcat 11.0.12 or later https://tomcat.apache.org/security-11.html |
| Guidance |
Update to Apache Tomcat 10.1.47 or later https://tomcat.apache.org/security-10.html |
| Guidance |
Update to Apache Tomcat 9.0.110 or later https://tomcat.apache.org/security-9.html |
CVE Vulnerabilities
Last edited: 29 October 2025 1:38 pm