Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.

Apache Tomcat Coyote HTTP Server May Allow Remote Code Execution

ROOT-APP-MAVEN-CVE-2025-48989
Summary

A security patch has been released for the Apache Tomcat Coyote HTTP server. This patch fixes a vulnerability that could allow an attacker to execute malicious code on your server. If you use this server, you should update to a patched version to prevent potential security risks.

What to do
  • Update io.root.org.apache.tomcat:tomcat-coyote to version 10.1.39-root.io.6.
  • Update io.root.org.apache.tomcat:tomcat-coyote to version 10.1.39-root.io.8.
  • Update io.root.org.apache.tomcat:tomcat-coyote to version 10.1.39-root.io.9.
  • Update io.root.org.apache.tomcat:tomcat-coyote to version 10.1.39-root.io.10.
Affected software
Ecosystem VendorProductAffected versions
Root:Maven – io.root.org.apache.tomcat:tomcat-coyote < 10.1.39-root.io.6
< 10.1.39-root.io.8
< 10.1.39-root.io.9
< 10.1.39-root.io.10
Fix: upgrade to 10.1.39-root.io.6
Original title
CVE-2025-48989 in io.root.org.apache.tomcat:tomcat-coyote - Patched by Root
Original description
Root has patched CVE-2025-48989 in the io.root.org.apache.tomcat:tomcat-coyote package for Root:Maven. Multiple fixed versions available.
Published: 17 Apr 2026 · Updated: 17 Apr 2026 · First seen: 14 Apr 2026