High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2025-31650
HighVulnerability Description
Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service.
This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.90 though 8.5.100.
Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Known Affected Software
63 configuration(s) from 1 vendor(s)
cpe:2.3:a:apache:tomcat:9.0.93:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.31:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.102:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.95:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.101:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.34:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.92:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.33:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.90:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.80:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.30:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.82:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.103:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.96:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.37:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.81:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.99:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.79:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.38:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.78:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone26:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.88:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.35:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.97:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.86:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.83:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.98:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.85:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.39:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.77:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.91:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.94:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.36:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.76:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.100:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.87:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.29:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.84:*:*:*:*:*:*:*
CPUOCT2025
Oracle Critical Patch Update Advisory - October 2025
CPUJUL2025
Oracle Critical Patch Update Advisory - July 2025
CVE-2025-31650
CVE-2025-31650
References & Resources
-
https://lists.apache.org/thread/j6zzk0y3yym9pzfzkq5vcyxzz0yzh826security@apache.org Mailing List Vendor Advisory
-
http://www.openwall.com/lists/oss-security/2025/04/28/2af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2025/07/msg00009.htmlaf854a3a-2127-422b-91ae-364da2661108
Severity Details
Key Information
- Published Date
- April 28, 2025
