Vulnerable Library - spring-boot-starter-web-3.5.5.jar
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Vulnerabilities
| Vulnerability |
Severity |
CVSS |
Dependency |
Type |
Fixed in (spring-boot-starter-web version) |
Remediation Possible** |
| CVE-2025-55754 |
Critical |
9.6 |
tomcat-embed-core-10.1.44.jar |
Transitive |
3.5.6 |
❌ |
| CVE-2026-29145 |
Critical |
9.1 |
tomcat-embed-core-10.1.44.jar |
Transitive |
3.5.13 |
❌ |
| CVE-2025-66614 |
High |
7.6 |
tomcat-embed-core-10.1.44.jar |
Transitive |
3.5.9 |
❌ |
| CVE-2026-34487 |
High |
7.5 |
tomcat-embed-core-10.1.44.jar |
Transitive |
4.0.0 |
❌ |
| CVE-2026-34483 |
High |
7.5 |
tomcat-embed-core-10.1.44.jar |
Transitive |
4.0.0 |
❌ |
| CVE-2026-29146 |
High |
7.5 |
tomcat-embed-core-10.1.44.jar |
Transitive |
3.5.13 |
❌ |
| CVE-2026-24880 |
High |
7.5 |
tomcat-embed-core-10.1.44.jar |
Transitive |
3.5.13 |
❌ |
| CVE-2025-55752 |
High |
7.5 |
tomcat-embed-core-10.1.44.jar |
Transitive |
3.5.6 |
❌ |
| CVE-2026-24734 |
High |
7.4 |
tomcat-embed-core-10.1.44.jar |
Transitive |
3.5.11 |
❌ |
| CVE-2026-34500 |
Medium |
6.5 |
tomcat-embed-core-10.1.44.jar |
Transitive |
4.0.0 |
❌ |
| CVE-2026-24733 |
Medium |
6.5 |
tomcat-embed-core-10.1.44.jar |
Transitive |
3.5.9 |
❌ |
| CVE-2026-22740 |
Medium |
6.5 |
spring-web-6.2.10.jar |
Transitive |
4.0.0 |
❌ |
| CVE-2026-25854 |
Medium |
6.1 |
tomcat-embed-core-10.1.44.jar |
Transitive |
3.5.13 |
❌ |
| CVE-2026-22737 |
Medium |
5.9 |
spring-webmvc-6.2.10.jar |
Transitive |
N/A* |
❌ |
| CVE-2025-61795 |
Medium |
5.3 |
tomcat-embed-core-10.1.44.jar |
Transitive |
N/A* |
❌ |
| CVE-2026-22741 |
Low |
3.1 |
spring-webmvc-6.2.10.jar |
Transitive |
4.0.0 |
❌ |
| CVE-2026-22735 |
Low |
2.6 |
detected in multiple dependencies |
Transitive |
3.5.12 |
❌ |
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2025-55754
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-tomcat-3.5.5.jar
- ❌ tomcat-embed-core-10.1.44.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.
Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
Publish Date: 2025-10-27
URL: CVE-2025-55754
CVSS 3 Score Details (9.6)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/j7w54hqbkfcn0xb9xy0wnx8w5nymcbqd
Release Date: 2025-10-27
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.45
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.6
Step up your Open Source Security Game with Mend here
CVE-2026-29145
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-tomcat-3.5.5.jar
- ❌ tomcat-embed-core-10.1.44.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13.
Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-29145
CVSS 3 Score Details (9.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.53
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.13
Step up your Open Source Security Game with Mend here
CVE-2025-66614
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-tomcat-3.5.5.jar
- ❌ tomcat-embed-core-10.1.44.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Improper Input Validation vulnerability.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected.
Tomcat did not validate that the host name provided via the SNI
extension was the same as the host name provided in the HTTP host header
field. If Tomcat was configured with more than one virtual host and the
TLS configuration for one of those hosts did not require client
certificate authentication but another one did, it was possible for a
client to bypass the client certificate authentication by sending
different host names in the SNI extension and the HTTP host header field.
The vulnerability only applies if client certificate authentication is
only enforced at the Connector. It does not apply if client certificate
authentication is enforced at the web application.
Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue.
Publish Date: 2026-02-17
URL: CVE-2025-66614
CVSS 3 Score Details (7.6)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: Low
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/vw6lxtlh2qbqwpb61wd3sv1flm2nttw7
Release Date: 2026-02-17
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.50
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.9
Step up your Open Source Security Game with Mend here
CVE-2026-34487
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-tomcat-3.5.5.jar
- ❌ tomcat-embed-core-10.1.44.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-34487
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.54
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0
Step up your Open Source Security Game with Mend here
CVE-2026-34483
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-tomcat-3.5.5.jar
- ❌ tomcat-embed-core-10.1.44.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 , which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-34483
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.54
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0
Step up your Open Source Security Game with Mend here
CVE-2026-29146
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-tomcat-3.5.5.jar
- ❌ tomcat-embed-core-10.1.44.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.
Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.
Publish Date: 2026-04-09
URL: CVE-2026-29146
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.53
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.13
Step up your Open Source Security Game with Mend here
CVE-2026-24880
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-tomcat-3.5.5.jar
- ❌ tomcat-embed-core-10.1.44.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may also be affected.
Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-24880
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.53
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.13
Step up your Open Source Security Game with Mend here
CVE-2025-55752
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-tomcat-3.5.5.jar
- ❌ tomcat-embed-core-10.1.44.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Relative Path Traversal vulnerability in Apache Tomcat.
The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
Publish Date: 2025-10-27
URL: CVE-2025-55752
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2025-10-27
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.45
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.6
Step up your Open Source Security Game with Mend here
CVE-2026-24734
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-tomcat-3.5.5.jar
- ❌ tomcat-embed-core-10.1.44.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat.
When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.
This issue affects Apache Tomcat Native: from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114.
The following versions were EOL at the time the CVE was created but are
known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected.
Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue.
Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.
Publish Date: 2026-02-17
URL: CVE-2026-24734
CVSS 3 Score Details (7.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/292dlmx3fz1888v6v16221kpozq56gml
Release Date: 2026-02-17
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.52
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.11
Step up your Open Source Security Game with Mend here
CVE-2026-34500
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-tomcat-3.5.5.jar
- ❌ tomcat-embed-core-10.1.44.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22 through 10.1.53, from 9.0.92 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fixes the issue.
Publish Date: 2026-04-09
URL: CVE-2026-34500
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.54
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0
Step up your Open Source Security Game with Mend here
CVE-2026-24733
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-tomcat-3.5.5.jar
- ❌ tomcat-embed-core-10.1.44.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Improper Input Validation vulnerability in Apache Tomcat.
Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
constraint was configured to allow HEAD requests to a URI but deny GET
requests, the user could bypass that constraint on GET requests by
sending a (specification invalid) HEAD request using HTTP/0.9.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112.
Older, EOL versions are also affected.
Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.
Publish Date: 2026-02-17
URL: CVE-2026-24733
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-02-17
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.50
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.9
Step up your Open Source Security Game with Mend here
CVE-2026-22740
Vulnerable Library - spring-web-6.2.10.jar
Spring Web
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-json-3.5.5.jar
- ❌ spring-web-6.2.10.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
A WebFlux server application that processes multipart requests creates temp files for parts larger than 10 K. Under some circumstances, temp files may remain not deleted after the request is fully processed. This allows an attacker to consume available disk space.
Publish Date: 2026-04-18
URL: CVE-2026-22740
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2026-22740
Release Date: 2026-04-18
Fix Resolution (org.springframework:spring-web): 6.2.18
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0
Step up your Open Source Security Game with Mend here
CVE-2026-25854
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-tomcat-3.5.5.jar
- ❌ tomcat-embed-core-10.1.44.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100.
Other, unsupported versions may also be affected
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-25854
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.53
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.13
Step up your Open Source Security Game with Mend here
CVE-2026-22737
Vulnerable Library - spring-webmvc-6.2.10.jar
Spring Web MVC
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- ❌ spring-webmvc-6.2.10.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Use of Java scripting engine enabled (e.g. JRuby, Jython) template views in Spring MVC and Spring WebFlux applications can result in disclosure of content from files outside the configured locations for script template views. This issue affects Spring Framework: from 7.0.0 through 7.0.5, from 6.2.0 through 6.2.16, from 6.1.0 through 6.1.25, from 5.3.0 through 5.3.46.
Publish Date: 2026-03-19
URL: CVE-2026-22737
CVSS 3 Score Details (5.9)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2026-22737
Release Date: 2026-03-19
Fix Resolution: org.springframework:spring-webflux:6.2.17,org.springframework:spring-webflux:7.0.6,https://github.com/spring-projects/spring-framework.git - v7.0.6
Step up your Open Source Security Game with Mend here
CVE-2025-61795
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-tomcat-3.5.5.jar
- ❌ tomcat-embed-core-10.1.44.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Improper Resource Shutdown or Release vulnerability in Apache Tomcat.
If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.
Publish Date: 2025-10-27
URL: CVE-2025-61795
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/wm9mx8brmx9g4zpywm06ryrtvd3160pp
Release Date: 2025-10-27
Fix Resolution: org.apache.tomcat:tomcat-catalina:11.0.12,org.apache.tomcat:tomcat-catalina:9.0.110,org.apache.tomcat:tomcat-catalina:10.1.47,org.apache.tomcat.embed:tomcat-embed-core:11.0.12,org.apache.tomcat.embed:tomcat-embed-core:9.0.110
Step up your Open Source Security Game with Mend here
CVE-2026-22741
Vulnerable Library - spring-webmvc-6.2.10.jar
Spring Web MVC
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- ❌ spring-webmvc-6.2.10.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Spring MVC and WebFlux applications are vulnerable to cache poisoning when resolving static resources.
More precisely, an application can be vulnerable when all the following are true:
the application is using Spring MVC or Spring WebFlux
the application is configuring the resource chain support with caching enabled
the application adds support for encoded resources resolution
the resource cache must be empty when the attacker has access to the application
When all the conditions above are met, the attacker can send malicious requests and poison the resource cache with resources using the wrong encoding. This can cause a denial of service by breaking the front-end application for clients.
Publish Date: 2026-04-18
URL: CVE-2026-22741
CVSS 3 Score Details (3.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2026-22741
Release Date: 2026-04-18
Fix Resolution (org.springframework:spring-webmvc): 6.2.18
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0
Step up your Open Source Security Game with Mend here
CVE-2026-22735
Vulnerable Libraries - spring-web-6.2.10.jar, spring-webmvc-6.2.10.jar
spring-web-6.2.10.jar
Spring Web
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- spring-boot-starter-json-3.5.5.jar
- ❌ spring-web-6.2.10.jar (Vulnerable Library)
spring-webmvc-6.2.10.jar
Spring Web MVC
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.5.5.jar (Root Library)
- ❌ spring-webmvc-6.2.10.jar (Vulnerable Library)
Found in base branch: main
Vulnerability Details
Spring MVC and WebFlux applications are vulnerable to stream corruption when using Server-Sent Events (SSE). This issue affects Spring Foundation: from 7.0.0 through 7.0.5, from 6.2.0 through 6.2.16, from 6.1.0 through 6.1.25, from 5.3.0 through 5.3.46.
Publish Date: 2026-03-19
URL: CVE-2026-22735
CVSS 3 Score Details (2.6)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.
Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2026-22735
Release Date: 2026-03-19
Fix Resolution (org.springframework:spring-web): 6.2.17
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.12
Fix Resolution (org.springframework:spring-webmvc): 6.2.17
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.12
Step up your Open Source Security Game with Mend here
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Vulnerabilities
*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.
Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
Publish Date: 2025-10-27
URL: CVE-2025-55754
CVSS 3 Score Details (9.6)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/j7w54hqbkfcn0xb9xy0wnx8w5nymcbqd
Release Date: 2025-10-27
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.45
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.6
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13.
Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-29145
CVSS 3 Score Details (9.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.53
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.13
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Improper Input Validation vulnerability.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected.
Tomcat did not validate that the host name provided via the SNI
extension was the same as the host name provided in the HTTP host header
field. If Tomcat was configured with more than one virtual host and the
TLS configuration for one of those hosts did not require client
certificate authentication but another one did, it was possible for a
client to bypass the client certificate authentication by sending
different host names in the SNI extension and the HTTP host header field.
The vulnerability only applies if client certificate authentication is
only enforced at the Connector. It does not apply if client certificate
authentication is enforced at the web application.
Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue.
Publish Date: 2026-02-17
URL: CVE-2025-66614
CVSS 3 Score Details (7.6)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/vw6lxtlh2qbqwpb61wd3sv1flm2nttw7
Release Date: 2026-02-17
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.50
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.9
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-34487
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.54
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 , which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-34483
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.54
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.
Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.
Publish Date: 2026-04-09
URL: CVE-2026-29146
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.53
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.13
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may also be affected.
Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-24880
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.53
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.13
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Relative Path Traversal vulnerability in Apache Tomcat.
The fix for bug 60013 introduced a regression where the rewritten URL was normalized before it was decoded. This introduced the possibility that, for rewrite rules that rewrite query parameters to the URL, an attacker could manipulate the request URI to bypass security constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
Publish Date: 2025-10-27
URL: CVE-2025-55752
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2025-10-27
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.45
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.6
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat.
When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.
This issue affects Apache Tomcat Native: from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114.
The following versions were EOL at the time the CVE was created but are
known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected.
Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue.
Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.
Publish Date: 2026-02-17
URL: CVE-2026-24734
CVSS 3 Score Details (7.4)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/292dlmx3fz1888v6v16221kpozq56gml
Release Date: 2026-02-17
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.52
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.11
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22 through 10.1.53, from 9.0.92 through 9.0.116.
Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fixes the issue.
Publish Date: 2026-04-09
URL: CVE-2026-34500
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.54
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Improper Input Validation vulnerability in Apache Tomcat.
Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
constraint was configured to allow HEAD requests to a URI but deny GET
requests, the user could bypass that constraint on GET requests by
sending a (specification invalid) HEAD request using HTTP/0.9.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112.
Older, EOL versions are also affected.
Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.
Publish Date: 2026-02-17
URL: CVE-2026-24733
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-02-17
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.50
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.9
Step up your Open Source Security Game with Mend here
Vulnerable Library - spring-web-6.2.10.jar
Spring Web
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
A WebFlux server application that processes multipart requests creates temp files for parts larger than 10 K. Under some circumstances, temp files may remain not deleted after the request is fully processed. This allows an attacker to consume available disk space.
Publish Date: 2026-04-18
URL: CVE-2026-22740
CVSS 3 Score Details (6.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2026-22740
Release Date: 2026-04-18
Fix Resolution (org.springframework:spring-web): 6.2.18
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100.
Other, unsupported versions may also be affected
Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.
Publish Date: 2026-04-09
URL: CVE-2026-25854
CVSS 3 Score Details (6.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Release Date: 2026-04-09
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.53
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.13
Step up your Open Source Security Game with Mend here
Vulnerable Library - spring-webmvc-6.2.10.jar
Spring Web MVC
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Use of Java scripting engine enabled (e.g. JRuby, Jython) template views in Spring MVC and Spring WebFlux applications can result in disclosure of content from files outside the configured locations for script template views. This issue affects Spring Framework: from 7.0.0 through 7.0.5, from 6.2.0 through 6.2.16, from 6.1.0 through 6.1.25, from 5.3.0 through 5.3.46.
Publish Date: 2026-03-19
URL: CVE-2026-22737
CVSS 3 Score Details (5.9)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2026-22737
Release Date: 2026-03-19
Fix Resolution: org.springframework:spring-webflux:6.2.17,org.springframework:spring-webflux:7.0.6,https://github.com/spring-projects/spring-framework.git - v7.0.6
Step up your Open Source Security Game with Mend here
Vulnerable Library - tomcat-embed-core-10.1.44.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Improper Resource Shutdown or Release vulnerability in Apache Tomcat.
If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.
Publish Date: 2025-10-27
URL: CVE-2025-61795
CVSS 3 Score Details (5.3)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/wm9mx8brmx9g4zpywm06ryrtvd3160pp
Release Date: 2025-10-27
Fix Resolution: org.apache.tomcat:tomcat-catalina:11.0.12,org.apache.tomcat:tomcat-catalina:9.0.110,org.apache.tomcat:tomcat-catalina:10.1.47,org.apache.tomcat.embed:tomcat-embed-core:11.0.12,org.apache.tomcat.embed:tomcat-embed-core:9.0.110
Step up your Open Source Security Game with Mend here
Vulnerable Library - spring-webmvc-6.2.10.jar
Spring Web MVC
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Spring MVC and WebFlux applications are vulnerable to cache poisoning when resolving static resources.
More precisely, an application can be vulnerable when all the following are true:
the application is using Spring MVC or Spring WebFlux
the application is configuring the resource chain support with caching enabled
the application adds support for encoded resources resolution
the resource cache must be empty when the attacker has access to the application
When all the conditions above are met, the attacker can send malicious requests and poison the resource cache with resources using the wrong encoding. This can cause a denial of service by breaking the front-end application for clients.
Publish Date: 2026-04-18
URL: CVE-2026-22741
CVSS 3 Score Details (3.1)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2026-22741
Release Date: 2026-04-18
Fix Resolution (org.springframework:spring-webmvc): 6.2.18
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 4.0.0
Step up your Open Source Security Game with Mend here
Vulnerable Libraries - spring-web-6.2.10.jar, spring-webmvc-6.2.10.jar
spring-web-6.2.10.jar
Spring Web
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
spring-webmvc-6.2.10.jar
Spring Web MVC
Library home page: https://github.com/spring-projects/spring-framework
Path to dependency file: /artemis-java-template/pom.xml
Path to vulnerable library: /artemis-java-template/pom.xml
Dependency Hierarchy:
Found in base branch: main
Vulnerability Details
Spring MVC and WebFlux applications are vulnerable to stream corruption when using Server-Sent Events (SSE). This issue affects Spring Foundation: from 7.0.0 through 7.0.5, from 6.2.0 through 6.2.16, from 6.1.0 through 6.1.25, from 5.3.0 through 5.3.46.
Publish Date: 2026-03-19
URL: CVE-2026-22735
CVSS 3 Score Details (2.6)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: None
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://spring.io/security/cve-2026-22735
Release Date: 2026-03-19
Fix Resolution (org.springframework:spring-web): 6.2.17
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.12
Fix Resolution (org.springframework:spring-webmvc): 6.2.17
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.5.12
Step up your Open Source Security Game with Mend here