Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
2.7

Apache Tomcat: Bypassing Security Constraints with Old HTTP Requests

CVE-2026-24733 GHSA-qq5r-98hh-rxc9 GHSA-qq5r-98hh-rxc9
Summary

Apache Tomcat versions 11.0.0-M1 to 11.0.14, 10.1.0-M1 to 10.1.49, and 9.0.0.M1 to 9.0.112 allow users to bypass security settings by sending old HTTP requests. This could potentially allow unauthorized access to restricted resources. To fix the issue, update to Tomcat version 11.0.15 or later, 10.1.50 or later, or 9.0.113 or later.

What to do
  • Update apache org.apache.tomcat.embed:tomcat-embed-core to version 11.0.14.
  • Update apache org.apache.tomcat.embed:tomcat-embed-core to version 10.1.49.
  • Update apache org.apache.tomcat.embed:tomcat-embed-core to version 9.0.112.
  • Update apache org.apache.tomcat:tomcat to version 11.0.14.
  • Update apache org.apache.tomcat:tomcat to version 10.1.49.
  • Update apache org.apache.tomcat:tomcat to version 9.0.112.
  • Update apache org.apache.tomcat:tomcat-catalina to version 11.0.14.
  • Update apache org.apache.tomcat:tomcat-catalina to version 10.1.49.
  • Update apache org.apache.tomcat:tomcat-catalina to version 9.0.112.
  • Update apache org.apache.tomcat.embed:tomcat-embed-core to version 11.0.15.
  • Update apache org.apache.tomcat.embed:tomcat-embed-core to version 10.1.50.
  • Update apache org.apache.tomcat.embed:tomcat-embed-core to version 9.0.113.
  • Update apache org.apache.tomcat:tomcat to version 11.0.15.
  • Update apache org.apache.tomcat:tomcat to version 10.1.50.
  • Update apache org.apache.tomcat:tomcat to version 9.0.113.
  • Update apache org.apache.tomcat:tomcat-catalina to version 11.0.15.
  • Update apache org.apache.tomcat:tomcat-catalina to version 10.1.50.
  • Update apache org.apache.tomcat:tomcat-catalina to version 9.0.113.
Affected software
VendorProductAffected versionsFix available
apache org.apache.tomcat.embed:tomcat-embed-core > 11.0.0-M1 , <= 11.0.14 11.0.14
apache org.apache.tomcat.embed:tomcat-embed-core > 10.1.0-M1 , <= 10.1.49 10.1.49
apache org.apache.tomcat.embed:tomcat-embed-core <= 9.0.112 9.0.112
apache org.apache.tomcat:tomcat > 11.0.0-M1 , <= 11.0.14 11.0.14
apache org.apache.tomcat:tomcat > 10.1.0-M1 , <= 10.1.49 10.1.49
apache org.apache.tomcat:tomcat <= 9.0.112 9.0.112
apache org.apache.tomcat:tomcat-catalina > 11.0.0-M1 , <= 11.0.14 11.0.14
apache org.apache.tomcat:tomcat-catalina > 10.1.0-M1 , <= 10.1.49 10.1.49
apache org.apache.tomcat:tomcat-catalina <= 9.0.112 9.0.112
apache org.apache.tomcat.embed:tomcat-embed-core > 11.0.0-M1 , <= 11.0.15 11.0.15
apache org.apache.tomcat.embed:tomcat-embed-core > 10.1.0-M1 , <= 10.1.50 10.1.50
apache org.apache.tomcat.embed:tomcat-embed-core <= 9.0.113 9.0.113
apache org.apache.tomcat:tomcat > 11.0.0-M1 , <= 11.0.15 11.0.15
apache org.apache.tomcat:tomcat > 10.1.0-M1 , <= 10.1.50 10.1.50
apache org.apache.tomcat:tomcat <= 9.0.113 9.0.113
apache org.apache.tomcat:tomcat-catalina > 11.0.0-M1 , <= 11.0.15 11.0.15
apache org.apache.tomcat:tomcat-catalina > 10.1.0-M1 , <= 10.1.50 10.1.50
apache org.apache.tomcat:tomcat-catalina <= 9.0.113 9.0.113
apache tomcat > 9.0.1 , <= 9.0.113
apache tomcat > 10.1.1 , <= 10.1.50
apache tomcat > 11.0.1 , <= 11.0.15
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 9.0.0
apache tomcat 10.0.0
apache tomcat 10.0.0
apache tomcat 10.0.0
apache tomcat 10.0.0
apache tomcat 10.0.0
apache tomcat 10.0.0
apache tomcat 10.0.0
apache tomcat 10.0.0
apache tomcat 10.0.0
apache tomcat 10.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
apache tomcat 11.0.0
Original title
Improper Input Validation vulnerability in Apache Tomcat. Tomcat did not limit HTTP/0.9 requests to the GET method. If a security constraint was configured to allow HEAD requests to a URI but de...
Original description
Improper Input Validation vulnerability in Apache Tomcat.


Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
constraint was configured to allow HEAD requests to a URI but deny GET
requests, the user could bypass that constraint on GET requests by
sending a (specification invalid) HEAD request using HTTP/0.9.


This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112.


Older, EOL versions are also affected.

Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.
Vulnerability type
CWE-20 Improper Input Validation
Published: 17 Feb 2026 · Updated: 12 Mar 2026 · First seen: 6 Mar 2026