CVE-2025-55752
Java vulnerability analysis and mitigation

Overview

A directory traversal vulnerability (CVE-2025-55752) was discovered in Apache Tomcat, affecting versions 11.0.0-M1 through 11.0.10, 10.1.0-M1 through 10.1.44, and 9.0.0.M11 through 9.0.108. The vulnerability was introduced as a regression from a fix for bug 60013, where rewritten URLs are normalized before being decoded (Debian Tracker, Security Online).

Technical details

The vulnerability stems from a regression in URL rewrite handling where the rewritten URL is normalized before it is decoded. This flaw allows attackers to manipulate query parameters in the request URI to bypass security constraints, particularly the protection for /WEB-INF/ and /META-INF/ directories. The issue was discovered by Chumy Tsai of CyCraft Technology and is rated as Important severity (Cybersecurity News).

Impact

If exploited, this vulnerability allows attackers to bypass access controls and security constraints. In configurations where PUT requests are enabled, attackers could potentially upload malicious files, leading to remote code execution (RCE). However, PUT requests are typically limited to trusted users, making the likelihood of exploitation in standard configurations relatively low (Security Online).

Mitigation and workarounds

Users are strongly advised to upgrade to the patched versions: Tomcat 11.0.11 or later, 10.1.45 or later, or 9.0.109 or later. Organizations should audit their configurations, particularly focusing on instances where PUT requests are enabled alongside URL rewriting features (Debian Tracker).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-62258HIGH7
  • JavaJava
  • cpe:2.3:a:liferay:liferay_portal
NoYesOct 27, 2025
CVE-2025-62259MEDIUM6.9
  • JavaJava
  • com.liferay.portal:release.portal.bom
NoYesOct 27, 2025
CVE-2025-12390MEDIUM6
  • JavaJava
  • org.keycloak:keycloak-services
NoNoOct 28, 2025
CVE-2025-64132MEDIUM5.4
  • JavaJava
  • io.jenkins.plugins:mcp-server
NoYesOct 29, 2025
CVE-2025-10939LOW3.7
  • JavaJava
  • org.keycloak:keycloak-quarkus-server
NoNoOct 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management