Apache Tomcat Vulnerable to Improper Neutralization of Escape, Meta, or Control Sequences — CVE-2025-55754
GitHub · GitHub · CVE-2025-55754
ID
CVE-2025-55754
CVE-2025-55754
Date
Updated
Activity
Source
GitHub
GitHub
Vendor
GitHub
GitHub
Threat
low
low
CVSS
2.1
2.1
EPSS
0.0012
0.0012
Summary
Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack…
Product
maven: org.apache.tomcat:tomcat | maven: org.apache.tomcat.embed:tomcat-embed-core | maven: org.apache.tomcat:tomcat-catalina
What to do
General, cautious steps (verify details in the official source):
- Review exposure and plan remediation based on risk and environment.
- Identify affected product versions in your inventory and verify whether you are impacted.
- Apply vendor patches/updates or recommended mitigations as soon as available.
- Read the official advisory for exact affected versions and remediation steps.