Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
2.7
Apache Tomcat: Bypassing Security Constraints with Old HTTP Requests
CVE-2026-24733
GHSA-qq5r-98hh-rxc9
GHSA-qq5r-98hh-rxc9
Summary
Apache Tomcat versions 11.0.0-M1 to 11.0.14, 10.1.0-M1 to 10.1.49, and 9.0.0.M1 to 9.0.112 allow users to bypass security settings by sending old HTTP requests. This could potentially allow unauthorized access to restricted resources. To fix the issue, update to Tomcat version 11.0.15 or later, 10.1.50 or later, or 9.0.113 or later.
What to do
- Update apache org.apache.tomcat.embed:tomcat-embed-core to version 11.0.14.
- Update apache org.apache.tomcat.embed:tomcat-embed-core to version 10.1.49.
- Update apache org.apache.tomcat.embed:tomcat-embed-core to version 9.0.112.
- Update apache org.apache.tomcat:tomcat to version 11.0.14.
- Update apache org.apache.tomcat:tomcat to version 10.1.49.
- Update apache org.apache.tomcat:tomcat to version 9.0.112.
- Update apache org.apache.tomcat:tomcat-catalina to version 11.0.14.
- Update apache org.apache.tomcat:tomcat-catalina to version 10.1.49.
- Update apache org.apache.tomcat:tomcat-catalina to version 9.0.112.
- Update apache org.apache.tomcat.embed:tomcat-embed-core to version 11.0.15.
- Update apache org.apache.tomcat.embed:tomcat-embed-core to version 10.1.50.
- Update apache org.apache.tomcat.embed:tomcat-embed-core to version 9.0.113.
- Update apache org.apache.tomcat:tomcat to version 11.0.15.
- Update apache org.apache.tomcat:tomcat to version 10.1.50.
- Update apache org.apache.tomcat:tomcat to version 9.0.113.
- Update apache org.apache.tomcat:tomcat-catalina to version 11.0.15.
- Update apache org.apache.tomcat:tomcat-catalina to version 10.1.50.
- Update apache org.apache.tomcat:tomcat-catalina to version 9.0.113.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| apache | org.apache.tomcat.embed:tomcat-embed-core | > 11.0.0-M1 , <= 11.0.14 | 11.0.14 |
| apache | org.apache.tomcat.embed:tomcat-embed-core | > 10.1.0-M1 , <= 10.1.49 | 10.1.49 |
| apache | org.apache.tomcat.embed:tomcat-embed-core | <= 9.0.112 | 9.0.112 |
| apache | org.apache.tomcat:tomcat | > 11.0.0-M1 , <= 11.0.14 | 11.0.14 |
| apache | org.apache.tomcat:tomcat | > 10.1.0-M1 , <= 10.1.49 | 10.1.49 |
| apache | org.apache.tomcat:tomcat | <= 9.0.112 | 9.0.112 |
| apache | org.apache.tomcat:tomcat-catalina | > 11.0.0-M1 , <= 11.0.14 | 11.0.14 |
| apache | org.apache.tomcat:tomcat-catalina | > 10.1.0-M1 , <= 10.1.49 | 10.1.49 |
| apache | org.apache.tomcat:tomcat-catalina | <= 9.0.112 | 9.0.112 |
| apache | org.apache.tomcat.embed:tomcat-embed-core | > 11.0.0-M1 , <= 11.0.15 | 11.0.15 |
| apache | org.apache.tomcat.embed:tomcat-embed-core | > 10.1.0-M1 , <= 10.1.50 | 10.1.50 |
| apache | org.apache.tomcat.embed:tomcat-embed-core | <= 9.0.113 | 9.0.113 |
| apache | org.apache.tomcat:tomcat | > 11.0.0-M1 , <= 11.0.15 | 11.0.15 |
| apache | org.apache.tomcat:tomcat | > 10.1.0-M1 , <= 10.1.50 | 10.1.50 |
| apache | org.apache.tomcat:tomcat | <= 9.0.113 | 9.0.113 |
| apache | org.apache.tomcat:tomcat-catalina | > 11.0.0-M1 , <= 11.0.15 | 11.0.15 |
| apache | org.apache.tomcat:tomcat-catalina | > 10.1.0-M1 , <= 10.1.50 | 10.1.50 |
| apache | org.apache.tomcat:tomcat-catalina | <= 9.0.113 | 9.0.113 |
| apache | tomcat | > 9.0.1 , <= 9.0.113 | – |
| apache | tomcat | > 10.1.1 , <= 10.1.50 | – |
| apache | tomcat | > 11.0.1 , <= 11.0.15 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 9.0.0 | – |
| apache | tomcat | 10.0.0 | – |
| apache | tomcat | 10.0.0 | – |
| apache | tomcat | 10.0.0 | – |
| apache | tomcat | 10.0.0 | – |
| apache | tomcat | 10.0.0 | – |
| apache | tomcat | 10.0.0 | – |
| apache | tomcat | 10.0.0 | – |
| apache | tomcat | 10.0.0 | – |
| apache | tomcat | 10.0.0 | – |
| apache | tomcat | 10.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
| apache | tomcat | 11.0.0 | – |
Original title
Improper Input Validation vulnerability in Apache Tomcat.
Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
constraint was configured to allow HEAD requests to a URI but de...
Original description
Improper Input Validation vulnerability in Apache Tomcat.
Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
constraint was configured to allow HEAD requests to a URI but deny GET
requests, the user could bypass that constraint on GET requests by
sending a (specification invalid) HEAD request using HTTP/0.9.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112.
Older, EOL versions are also affected.
Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.
Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
constraint was configured to allow HEAD requests to a URI but deny GET
requests, the user could bypass that constraint on GET requests by
sending a (specification invalid) HEAD request using HTTP/0.9.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112.
Older, EOL versions are also affected.
Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.
Vulnerability type
CWE-20
Improper Input Validation
- https://lists.apache.org/thread/6xk3t65qpn1myp618krtfotbjn1qt90f
- https://nvd.nist.gov/vuln/detail/CVE-2026-24733
- https://github.com/apache/tomcat/commit/2e2fa23f2635bbb819759576a2f2f5e64ecf7c5f
- https://github.com/apache/tomcat/commit/6c73d74ff281260d74c836370ff6b82f1da8048b
- https://github.com/apache/tomcat/commit/711b465cf22684a1acf0cb43501cdbbce9b6c5f4
- https://tomcat.apache.org/security-10.html
- https://tomcat.apache.org/security-11.html
- https://tomcat.apache.org/security-9.html
- https://github.com/advisories/GHSA-qq5r-98hh-rxc9
- https://github.com/apache/tomcat Product
Published: 17 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026