We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-46701

Apache Tomcat: Security constraint bypass for CGI scripts



Description

Improper Handling of Case Sensitivity vulnerability in Apache Tomcat's GCI servlet allows security constraint bypass of security constraints that apply to the pathInfo component of a URI mapped to the CGI servlet. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.6, from 10.1.0-M1 through 10.1.40, from 9.0.0.M1 through 9.0.104. Users are recommended to upgrade to version 11.0.7, 10.1.41 or 9.0.105, which fixes the issue.

Reserved 2025-04-28 | Published 2025-05-29 | Updated 2025-05-30 | Assigner apache

Problem types

CWE-178 Improper Handling of Case Sensitivity

Product status

Default status
unaffected

11.0.0-M1
affected

10.1.0-M1
affected

9.0.0.M1
affected

Credits

Greg K (https://github.com/gregk4sec) finder

References

lists.apache.org/thread/xhqqk9w5q45srcdqhogdk04lhdscv30j vendor-advisory

cve.org (CVE-2025-46701)

nvd.nist.gov (CVE-2025-46701)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-46701

Support options

Helpdesk Chat, Email, Knowledgebase