CVE-2025-46701
Java vulnerability analysis and mitigation

Overview

A case sensitivity vulnerability (CVE-2025-46701) was discovered in Apache Tomcat's CGI servlet that allows attackers to bypass security constraints. The vulnerability affects Apache Tomcat versions 11.0.0-M1 through 11.0.6, 10.1.0-M1 through 10.1.40, and 9.0.0.M1 through 9.0.104. The flaw was disclosed on May 29, 2025, and is classified as CWE-178 (Improper Handling of Case Sensitivity) (NVD, OSS-Security).

Technical details

The vulnerability specifically impacts how Tomcat's CGI servlet handles case sensitivity in the pathInfo component of URLs mapped to the CGI servlet. When Tomcat is deployed on a case-insensitive file system (such as Windows or macOS), specially crafted URLs can bypass security constraints configured for the pathInfo. The vulnerability has received a CVSS 3.1 base score of 7.3 (High) from CISA-ADP with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L (GBHackers, NVD).

Impact

The vulnerability allows unauthorized access to restricted CGI resources by bypassing security constraints through case manipulation in URLs. While the CGI servlet is disabled by default in all Tomcat versions, organizations that rely on CGI-based applications with strict access controls may be at risk of unauthorized access to protected resources (GBHackers).

Mitigation and workarounds

The Apache Software Foundation has released patched versions: Tomcat 11.0.7, 10.1.41, and 9.0.105 to address the vulnerability. Organizations are recommended to upgrade to these versions immediately. For those not requiring CGI functionality, it is strongly recommended to ensure the CGI servlet remains disabled to reduce the attack surface (GBHackers).

Community reactions

The vulnerability was responsibly disclosed by security researcher Greg K, highlighting the ongoing need for vigilance in mature, widely-used open-source projects. While classified as low severity by the Apache Software Foundation, the vulnerability has garnered attention due to its potential impact on organizations relying on CGI-based applications (GBHackers).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management