Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.3

Apache Tomcat: Server Certificate Verification Bypass

CVE-2025-66614 GHSA-fpj8-gq4v-p354 GHSA-fpj8-gq4v-p354
Summary

A security issue exists in certain versions of Apache Tomcat that allows an attacker to bypass required client certificate checks. This can be exploited by an attacker to gain unauthorized access to the server. Users of affected versions should update to a fixed version to prevent this vulnerability.

What to do
  • Update apache org.apache.tomcat.embed:tomcat-embed-core to version 11.0.14.
  • Update apache org.apache.tomcat.embed:tomcat-embed-core to version 10.1.49.
  • Update apache org.apache.tomcat.embed:tomcat-embed-core to version 9.0.112.
  • Update apache org.apache.tomcat:tomcat to version 11.0.14.
  • Update apache org.apache.tomcat:tomcat to version 10.1.49.
  • Update apache org.apache.tomcat:tomcat to version 9.0.112.
  • Update apache org.apache.tomcat:tomcat-catalina to version 11.0.14.
  • Update apache org.apache.tomcat:tomcat-catalina to version 10.1.49.
  • Update apache org.apache.tomcat:tomcat-catalina to version 9.0.112.
  • Update apache org.apache.tomcat.embed:tomcat-embed-core to version 11.0.15.
  • Update apache org.apache.tomcat.embed:tomcat-embed-core to version 10.1.50.
  • Update apache org.apache.tomcat.embed:tomcat-embed-core to version 9.0.113.
  • Update apache org.apache.tomcat:tomcat to version 11.0.15.
  • Update apache org.apache.tomcat:tomcat to version 10.1.50.
  • Update apache org.apache.tomcat:tomcat to version 9.0.113.
  • Update apache org.apache.tomcat:tomcat-catalina to version 11.0.15.
  • Update apache org.apache.tomcat:tomcat-catalina to version 10.1.50.
  • Update apache org.apache.tomcat:tomcat-catalina to version 9.0.113.
  • Update org.apache.tomcat.embed:tomcat-embed-core to version 11.0.15.
  • Update org.apache.tomcat.embed:tomcat-embed-core to version 10.1.50.
  • Update org.apache.tomcat.embed:tomcat-embed-core to version 9.0.113.
  • Update org.apache.tomcat:tomcat to version 11.0.15.
  • Update org.apache.tomcat:tomcat to version 10.1.50.
  • Update org.apache.tomcat:tomcat to version 9.0.113.
  • Update org.apache.tomcat:tomcat-catalina to version 11.0.15.
  • Update org.apache.tomcat:tomcat-catalina to version 10.1.50.
  • Update org.apache.tomcat:tomcat-catalina to version 9.0.113.
Affected software
VendorProductAffected versionsFix available
apache org.apache.tomcat.embed:tomcat-embed-core > 11.0.0-M1 , <= 11.0.14 11.0.14
apache org.apache.tomcat.embed:tomcat-embed-core > 10.1.0-M1 , <= 10.1.49 10.1.49
apache org.apache.tomcat.embed:tomcat-embed-core <= 9.0.112 9.0.112
apache org.apache.tomcat:tomcat > 11.0.0-M1 , <= 11.0.14 11.0.14
apache org.apache.tomcat:tomcat > 10.1.0-M1 , <= 10.1.49 10.1.49
apache org.apache.tomcat:tomcat <= 9.0.112 9.0.112
apache org.apache.tomcat:tomcat-catalina > 11.0.0-M1 , <= 11.0.14 11.0.14
apache org.apache.tomcat:tomcat-catalina > 10.1.0-M1 , <= 10.1.49 10.1.49
apache org.apache.tomcat:tomcat-catalina <= 9.0.112 9.0.112
apache org.apache.tomcat.embed:tomcat-embed-core > 11.0.0-M1 , <= 11.0.15 11.0.15
apache org.apache.tomcat.embed:tomcat-embed-core > 10.1.0-M1 , <= 10.1.50 10.1.50
apache org.apache.tomcat.embed:tomcat-embed-core <= 9.0.113 9.0.113
apache org.apache.tomcat:tomcat > 11.0.0-M1 , <= 11.0.15 11.0.15
apache org.apache.tomcat:tomcat > 10.1.0-M1 , <= 10.1.50 10.1.50
apache org.apache.tomcat:tomcat <= 9.0.113 9.0.113
apache org.apache.tomcat:tomcat-catalina > 11.0.0-M1 , <= 11.0.15 11.0.15
apache org.apache.tomcat:tomcat-catalina > 10.1.0-M1 , <= 10.1.50 10.1.50
apache org.apache.tomcat:tomcat-catalina <= 9.0.113 9.0.113
apache tomcat > 9.0.1 , <= 9.0.113
apache tomcat > 10.1.1 , <= 10.1.50
apache tomcat > 11.0.1 , <= 11.0.15
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 10.1.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
org.apache.tomcat.embed:tomcat-embed-core > 11.0.0-M1 , <= 11.0.15 11.0.15
org.apache.tomcat.embed:tomcat-embed-core > 10.1.0-M1 , <= 10.1.50 10.1.50
org.apache.tomcat.embed:tomcat-embed-core <= 9.0.113 9.0.113
org.apache.tomcat:tomcat > 11.0.0-M1 , <= 11.0.15 11.0.15
org.apache.tomcat:tomcat > 10.1.0-M1 , <= 10.1.50 10.1.50
org.apache.tomcat:tomcat <= 9.0.113 9.0.113
org.apache.tomcat:tomcat-catalina > 11.0.0-M1 , <= 11.0.15 11.0.15
org.apache.tomcat:tomcat-catalina > 10.1.0-M1 , <= 10.1.50 10.1.50
org.apache.tomcat:tomcat-catalina <= 9.0.113 9.0.113
Original title
Apache Tomcat - Client certificate verification bypass
Original description
Improper Input Validation vulnerability.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112.

The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected. Tomcat did not validate that the host name provided via the SNI extension was the same as the host name provided in the HTTP host header field. If Tomcat was configured with more than one virtual host and the TLS configuration for one of those hosts did not require client certificate authentication but another one did, it was possible for a client to bypass the client certificate authentication by sending different host names in the SNI extension and the HTTP host header field.

The vulnerability only applies if client certificate authentication is only enforced at the Connector. It does not apply if client certificate authentication is enforced at the web application.

Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue.
Vulnerability type
CWE-20 Improper Input Validation
CWE-295 Improper Certificate Validation
Published: 17 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026