CVE-2025-61795

Published Oct 27, 2025

Last updated 14 days ago

CVSS medium 5.3
Apache Tomcat

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-61795 is a vulnerability affecting Apache Tomcat. It stems from improper resource shutdown or release during multipart upload processing. Specifically, if an error occurs, including exceeding limits, temporary copies of uploaded parts written to disk are not immediately cleaned up but are left for the garbage collection process. This delayed cleaning of temporary files can lead to a denial-of-service (DoS) condition. Depending on JVM settings, application memory usage, and application load, the space for these temporary copies can fill up faster than the garbage collector clears them. This issue affects Apache Tomcat versions 11.0.0-M1 through 11.0.11, 10.1.0-M1 through 10.1.46, and 9.0.0.M1 through 9.0.109, as well as potentially older, end-of-life versions. Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later, or 9.0.110 or later to mitigate the vulnerability.

Description
Improper Resource Shutdown or Release vulnerability in Apache Tomcat. If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.
Source
security@apache.org
NVD status
Awaiting Analysis

Risk scores

CVSS 3.1

Type
Secondary
Base score
5.3
Impact score
3.6
Exploitability score
1.6
Vector string
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Severity
MEDIUM

Weaknesses

security@apache.org
CWE-404

Social media

Hype score
Not currently trending
  1. 2025.10.29 JVNVU#95235705 Apache Tomcatにおける複数の脆弱性(CVE-2025-55752、CVE-2025-55754、CVE-2025-61795) - Japan Vulnerability Notes(JVN) https://t.co/pSqDQBIhMh

    @kawn2020

    30 Oct 2025

    42 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. 統合版 JPCERT/CC | JVN: Apache Tomcatにおける複数の脆弱性(CVE-2025-55752、CVE-2025-55754、CVE-2025-61795) https://t.co/gryJvIY4tA #itsec_jp

    @itsec_jp

    30 Oct 2025

    109 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  3. #後で読む 用メモです→ Apache Tomcatにおける複数の脆弱性(CVE-2025-55752、CVE-2025-55754、CVE-2025-61795) https://t.co/P8g4OlhoMt

    @TommiyTw

    30 Oct 2025

    51 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. [JVNVU#95235705] Apache Tomcatにおける複数の脆弱性(CVE-2025-55752、CVE-2025-55754、CVE-2025-61795) https://t.co/x9f8GYA08p #jvn #脆弱性 #セキュリティ

    @jpsecuritynews

    30 Oct 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  5. JVNVU#95235705 Apache Tomcatにおける複数の脆弱性(CVE-2025-55752、CVE-2025-55754、CVE-2025-61795) https://t.co/fm9OrZjLh5 アップデートで対応されていますので、利用されている方は早めのアップデートを。

    @Syynya

    29 Oct 2025

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. 🚨Apache Tomcat Patches 3 Vulns CVE-2025-55752: Bypass auth → HTTP PUT malicious upload = RCE (certain configs) CVE-2025-55754: ANSI escape hijack on Windows consoles CVE-2025-61795: Multipart upload crash = DoS ZoomEye Dork👉app="Apache Tomcat" 822.3k+ exposed on Zoom

    @Endurance448146

    29 Oct 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  7. 🚨🚨Apache Tomcat Patches 3 Vulns CVE-2025-55752: Bypass auth → HTTP PUT malicious upload = RCE (certain configs) CVE-2025-55754: ANSI escape hijack on Windows consoles CVE-2025-61795: Multipart upload crash = DoS ZoomEye Dork👉app="Apache Tomcat" 822.3k+ exposed htt

    @Endurance448146

    29 Oct 2025

    1 Impression

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. [2025/10/29 15:45 公表] Apache Tomcatにおける複数の脆弱性(CVE-2025-55752、CVE-2025-55754、CVE-2025-61795) https://t.co/Tpy7mJ7HOX

    @jvnjp

    29 Oct 2025

    1975 Impressions

    2 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    1 Quote

  9. 🚨 #Apache Tomcat(アパッチトムキャット) 緊急セキュリティアラート🚨​ CVE-2025-55752:HTTP PUT経由 RCE​ CVE-2025-55754:ANSIコンソールインジェクション​ CVE-2025-61795:Multipartクラッシュ → DoS ​ に対する修正が公

    @CriminalIP_JP

    29 Oct 2025

    167 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  10. 🚨 Apache Tomcat 긴급 보안 공지 —​ CVE-2025-55752(HTTP PUT → RCE, Bypass auth) / CVE-2025-55754(ANSI 콘솔 인젝션) / CVE-2025-61795(Multipart 크래시 → DoS) — 패치 권고​ ​ Criminal IP 검색 결과(product:Tomcat) 558,728개의 외부 노출 인

    @CriminalIP_KR

    29 Oct 2025

    119 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  11. 🚨🚨Apache Tomcat Patches 3 Vulns CVE-2025-55752: Bypass auth → HTTP PUT malicious upload = RCE (certain configs) CVE-2025-55754: ANSI escape hijack on Windows consoles CVE-2025-61795: Multipart upload crash = DoS ZoomEye Dork👉app="Apache Tomcat" 822.3k+ exposed on

    @zoomeye_team

    28 Oct 2025

    18348 Impressions

    68 Retweets

    256 Likes

    97 Bookmarks

    0 Replies

    2 Quotes

  12. Apache Tomcat https://t.co/SmE0sSXxkn CVE-2025-55752: Directory traversal via rewrite with possible RCE if PUT is enabled CVE-2025-55754: Console manipulation via escape sequences in log messages CVE-2025-61795: DoS via delayed cleaning of multi-part upload temporary files

    @oss_security

    28 Oct 2025

    1668 Impressions

    3 Retweets

    15 Likes

    1 Bookmark

    0 Replies

    0 Quotes

References

Sources include official advisories and independent security research.