On October 27, 2025, the Apache Software Foundation disclosed two new vulnerabilities affecting its widely deployed Apache Tomcat web server. The most critical of these is CVE-2025-55752, an 'Important' severity path traversal vulnerability that could lead to information disclosure or, in non-default configurations, remote code execution (RCE). This flaw allows an attacker to bypass security controls and access sensitive web application directories. A second, low-severity vulnerability, CVE-2025-55754, impacts Windows environments and involves the improper handling of ANSI escape codes in logs. Administrators of web applications running on affected Tomcat versions are strongly advised to review their configurations and upgrade to patched versions to prevent potential exploitation.
/WEB-INF/ and /META-INF/, potentially leading to the disclosure of configuration files, source code, or other sensitive data.The primary risk comes from CVE-2025-55752. A successful exploit could lead to:
/WEB-INF/ or /META-INF/, such as web.xml, which contains application configuration, or class files containing compiled Java code. This information can be used to plan further attacks.D3FEND Technique: Detection of exploitation attempts for CVE-2025-55752 would primarily involve
D3-NTA - Network Traffic Analysisand log inspection.
%2e%2e%2f or ..;. Look for requests attempting to access /WEB-INF/ or /META-INF/ that result in a 200 OK status, which could indicate a successful bypass.server.xml and web.xml files to determine if HTTP PUT requests are enabled. The readonly initialization parameter for the DefaultServlet should be set to true (which is the default).D3FEND Countermeasure: The most effective countermeasure is
D3-SU - Software Update. Hardening configurations is also a critical secondary step.
readonly parameter of the DefaultServlet to true in web.xml.Upgrade to a patched version of Apache Tomcat to fully remediate the vulnerabilities.
Mapped D3FEND Techniques:
Harden the Tomcat configuration by ensuring that HTTP PUT and other unnecessary methods are disabled.
Mapped D3FEND Techniques:
Use a Web Application Firewall (WAF) to filter malicious requests containing path traversal patterns.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats