-
Notifications
You must be signed in to change notification settings - Fork 1.4k
Description
CVE-2025-48989 - High Severity Vulnerability
Vulnerable Library - tomcat-embed-core-10.1.40.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /hapi-fhir-spring-boot/hapi-fhir-spring-boot-samples/hapi-fhir-spring-boot-sample-client-okhttp/pom.xml
Path to vulnerable library: /hapi-fhir-spring-boot/hapi-fhir-spring-boot-samples/hapi-fhir-spring-boot-sample-client-okhttp/pom.xml,/hapi-fhir-spring-boot/hapi-fhir-spring-boot-samples/hapi-fhir-spring-boot-sample-server-jersey/pom.xml,/hapi-fhir-spring-boot/hapi-fhir-spring-boot-samples/hapi-fhir-spring-boot-sample-client-apache/pom.xml
Dependency Hierarchy:
- spring-boot-starter-web-3.3.11.jar (Root Library)
- spring-boot-starter-tomcat-3.3.11.jar
- ❌ tomcat-embed-core-10.1.40.jar (Vulnerable Library)
- spring-boot-starter-tomcat-3.3.11.jar
Found in base branch: master
Vulnerability Details
Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected.
Users are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue.
Publish Date: 2025-08-13
URL: CVE-2025-48989
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
Suggested Fix
Type: Upgrade version
Release Date: 2025-08-13
Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 10.1.44
Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 3.4.9
Step up your Open Source Security Game with Mend here