The Apache Software Foundation has disclosed and patched two significant vulnerabilities in its widely deployed Apache Tomcat web server. The most critical flaw, CVE-2025-55752, is a directory traversal vulnerability that could lead to remote code execution (RCE) under certain non-default configurations. A second, lower-severity issue, CVE-2025-55754, involves improper handling of ANSI escape sequences that could allow an attacker to manipulate console output on Windows systems. The vulnerabilities affect Tomcat versions 9, 10, and 11, prompting an urgent call for administrators to apply the updates released on October 27, 2025.
This vulnerability is a regression of a previous bug fix. It arises from the way Tomcat handles URL rewrites that affect query parameters. The server normalizes the rewritten URL before it is decoded, creating an opportunity for an attacker to craft a malicious request URI. This can bypass security constraints designed to protect sensitive directories like /WEB-INF/ (which contains application classes and libraries) and /META-INF/ (which holds configuration data).
The direct impact is information disclosure. However, if the server has been configured to allow HTTP PUT requests (which is not the default setting), an attacker can exploit this directory traversal to upload a malicious file (e.g., a JSP web shell) to a web-accessible directory, achieving remote code execution (T1505.003 - Web Shell).
This flaw affects Tomcat running on Windows systems where the console supports ANSI escape sequences. An attacker can craft a malicious URL or other input that, when logged by Tomcat, injects ANSI escape sequences into the log files. If an administrator views these logs in a compatible terminal, the escape sequences could be interpreted, allowing the attacker to manipulate the console display, potentially overwrite clipboard content, or trick the administrator into executing a command.
The vulnerabilities impact a wide range of Tomcat versions:
11.0.0-M1 to 11.0.1010.1.0-M1 to 10.1.449.0.0.M11 to 9.0.108Users are urged to upgrade to the following patched versions:
There are no public reports of active exploitation for these vulnerabilities. However, vulnerabilities in ubiquitous software like Apache Tomcat are prime targets for automated scanning and exploitation by threat actors once a proof-of-concept becomes available.
PUT enabled), the impact is a full server compromise via RCE, allowing an attacker to steal data, pivot to other network systems, or use the server for malicious activities.| Type | Value | Description |
|---|---|---|
| url_pattern | ..; or other path traversal sequences in query params |
Look for suspicious path traversal sequences in the query string portion of URLs in web server access logs, especially in rewritten requests. |
| log_source | Tomcat log files (catalina.out) |
Scan logs for raw ANSI escape sequences (e.g., \u001b[...) which could indicate attempts to exploit CVE-2025-55754. |
| http_method | PUT |
Monitor for PUT requests to unexpected endpoints, which could signify an attempt to upload a file via CVE-2025-55752. |
web.xml) to determine if PUT requests are enabled (the readonly initialization parameter is set to false). Systems with this configuration are at much higher risk and should be prioritized for patching..jsp.D3-NTA: Network Traffic Analysis to monitor for anomalous HTTP requests and D3-FA: File Analysis on uploaded files.PUT requests are disabled unless absolutely necessary for application functionality. This can be done by ensuring the readonly init parameter for the Default servlet is set to true in conf/web.xml.less -r, cat) are configured to properly handle or strip escape sequences, or use log viewers that are not susceptible.D3-SU: Software Update.D3-ACH: Application Configuration Hardening.Upgrading to a patched version of Apache Tomcat is the most effective mitigation.
Mapped D3FEND Techniques:
As a workaround, ensure the 'readonly' parameter is set to true to disable PUT requests, mitigating the RCE vector for CVE-2025-55752.
Mapped D3FEND Techniques:
Use a Web Application Firewall (WAF) to filter for directory traversal and other malicious request patterns.
Mapped D3FEND Techniques:
The definitive countermeasure for both CVE-2025-55752 and CVE-2025-55754 is to upgrade all Apache Tomcat instances to a patched version. Administrators must identify all vulnerable servers and update them to Tomcat 11.0.11+, 10.1.45+, or 9.0.109+. Given the ubiquity of Tomcat, a comprehensive asset inventory is the first step. Patching should be prioritized based on the server's exposure and configuration. Internet-facing servers and those confirmed to have PUT requests enabled (readonly=false) are at the highest risk for RCE and must be patched immediately. This action directly closes the directory traversal and ANSI escape sequence vulnerabilities at the source code level.
As a critical mitigating control for CVE-2025-55752, administrators must review and harden their Tomcat configurations. Specifically, locate the Default servlet definition in conf/web.xml and ensure the readonly initialization parameter is set to true (or not present, as true is the default). Setting <param-value>true</param-value> explicitly disables HTTP methods like PUT and DELETE. This single configuration change prevents the directory traversal flaw from being escalated to remote code execution, as the attacker would no longer have a method to upload their malicious file. This is an essential defense-in-depth measure that should be standard practice for all production Tomcat deployments, as write operations should rarely be handled by the default servlet.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats