Apache Tomcat Vulnerable to Relative Path Traversal — CVE-2025-55752
GitHub · GitHub · CVE-2025-55752
ID
CVE-2025-55752
CVE-2025-55752
Date
Updated
Activity
Source
GitHub
GitHub
Vendor
GitHub
GitHub
Threat
high
high
CVSS
7.7
7.7
EPSS
0.00143
0.00143
Summary
The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading…
Product
maven: org.apache.tomcat:tomcat | maven: org.apache.tomcat:tomcat-catalina | maven: org.apache.tomcat.embed:tomcat-embed-core
What to do
General, cautious steps (verify details in the official source):
- Prioritize patching or mitigation immediately (treat as actively risky).
- Identify affected product versions in your inventory and verify whether you are impacted.
- Apply vendor patches/updates or recommended mitigations as soon as available.
- Read the official advisory for exact affected versions and remediation steps.