High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2026-34483
HighVulnerability Description
Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 , which fix the issue.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Known Affected Software
131 configuration(s) from 1 vendor(s)
cpe:2.3:a:apache:tomcat:9.0.93:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.31:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.102:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.95:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.75:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.70:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.108:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.101:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.34:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.73:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.47:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.48:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.92:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.33:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.90:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.56:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.68:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.80:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.62:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.109:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.40:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.57:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.30:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.111:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.71:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.82:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.103:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.74:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.45:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.96:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.58:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.65:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.44:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.54:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.47:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.49:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.37:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.81:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.99:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.59:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.79:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.42:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.38:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.78:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.0:milestone26:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.88:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.46:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.35:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.45:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.41:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.42:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.106:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.60:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.53:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.107:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.51:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.48:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.44:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.97:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.41:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.86:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.110:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.83:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.98:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.55:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.67:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.63:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.50:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.85:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.43:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.105:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.72:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.52:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.43:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.39:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.0:milestone18:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.77:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.91:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.61:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.94:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.104:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.36:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.76:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.100:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.87:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.40:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.29:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.69:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.1.46:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:11.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.84:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.64:*:*:*:*:*:*:*
CVE-2026-34483
CVE-2026-34483
Severity Details
Weakness Type (CWE)
Improper Encoding or Escaping of Output
- Description
- The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.
- Exploit Likelihood
- High
- Typical Severity
- Medium
- Abstraction Level
- Class
Key Information
- Published Date
- April 09, 2026
