
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A case sensitivity vulnerability (CVE-2025-46701) was discovered in Apache Tomcat's CGI servlet that allows attackers to bypass security constraints. The vulnerability affects Apache Tomcat versions 11.0.0-M1 through 11.0.6, 10.1.0-M1 through 10.1.40, and 9.0.0.M1 through 9.0.104. The flaw was disclosed on May 29, 2025, and is classified as CWE-178 (Improper Handling of Case Sensitivity) (NVD, OSS-Security).
The vulnerability specifically impacts how Tomcat's CGI servlet handles case sensitivity in the pathInfo component of URLs mapped to the CGI servlet. When Tomcat is deployed on a case-insensitive file system (such as Windows or macOS), specially crafted URLs can bypass security constraints configured for the pathInfo. The vulnerability has received a CVSS 3.1 base score of 7.3 (High) from CISA-ADP with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L (GBHackers, NVD).
The vulnerability allows unauthorized access to restricted CGI resources by bypassing security constraints through case manipulation in URLs. While the CGI servlet is disabled by default in all Tomcat versions, organizations that rely on CGI-based applications with strict access controls may be at risk of unauthorized access to protected resources (GBHackers).
The Apache Software Foundation has released patched versions: Tomcat 11.0.7, 10.1.41, and 9.0.105 to address the vulnerability. Organizations are recommended to upgrade to these versions immediately. For those not requiring CGI functionality, it is strongly recommended to ensure the CGI servlet remains disabled to reduce the attack surface (GBHackers).
The vulnerability was responsibly disclosed by security researcher Greg K, highlighting the ongoing need for vigilance in mature, widely-used open-source projects. While classified as low severity by the Apache Software Foundation, the vulnerability has garnered attention due to its potential impact on organizations relying on CGI-based applications (GBHackers).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”