Apache Tomcat DoS Vulnerability

MEDIUM (5.3) No Patch (53 days)

Threat Intelligence

Medium Risk - Detectable
EPSS Score: 0.12% chance of exploitation (percentile: 33%)
🔍 Detection Tools: OSV.dev
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

Apache Tomcat is a popular web server software used by many organizations. This vulnerability occurs when the software fails to properly clean up temporary files after an error during multipart upload processing, potentially leading to denial-of-service (DoS) attacks.

Am I affected?

Apache Tomcat versions 11.0.0-M1 through 11.0.11, 10.1.0-M1 through 10.1.46, and 9.0.0.M1 through 9.0.109 are affected. To check if you're impacted, run the command find / -name "tomcat*.jar" 2>/dev/null or use your package manager to search for Tomcat packages.

Note: This vulnerability is not related to Apache HTTP Server (Nginx), which has its own vulnerabilities.

Affected Packages

maven: org.apache.tomcat.embed:tomcat-embed-core

Affected Products

Apache Software Foundation / Tomcat

How to fix

Upgrade to Apache Tomcat version 11.0.12 or later, 10.1.47 or later, or 9.0.110 or later.
- Immediate mitigations:
- Restrict network access to your Tomcat instance (firewall it from the public internet)
- Audit Tomcat logs for suspicious activity patterns
- Monitor for unauthorized access attempts