Description
Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.

Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.
Published: 2026-04-09
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality Compromise
Action: Immediate Patch
AI Analysis

Impact

Apache Tomcat’s EncryptInterceptor has a padding oracle flaw that, when enabled by default, lets an attacker send crafted ciphertext and learn the plaintext by observing response differences. The vulnerability is rooted in inadequate boundary checks and error handling and is mapped to CWE‑1240, CWE‑209 and CWE‑642. Successful exploitation can expose encrypted configuration values, session data or other confidential information stored by the application.

Affected Systems

The flaw affects Apache Tomcat across multiple releases: versions 11.0.0‑M1 through 11.0.18, 10.0.0‑M1 through 10.1.52, 9.0.13 through 9.0.115, 8.5.38 through 8.5.100, and 7.0.100 through 7.0.109. Apache recommends upgrading to 11.0.19, 10.1.53, or 9.0.116 where the patch is incorporated. No specific fix versions are listed for the 8.5.x or 7.x series in the advisory; administrators should check for newer releases or apply a local disable of the interceptor if the feature is not required.

Risk and Exploitability

With a CVSS base score of 7.5 the vulnerability is considered high severity, yet the EPSS score is below 1 % indicating a low likelihood of real‑world exploitation so far. It is not present in the CISA KEV catalog. The likely attack vector is remote HTTP access to a Tomcat instance that accepts encrypted parameters; an attacker would need to supply sequences of ciphertext that trigger decryption errors, then analyze the error responses or timing to gradually recover the plaintext.

Generated by OpenCVE AI on April 14, 2026 at 15:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest Tomcat releases that include the hot‑fix: 11.0.19, 10.1.53, or 9.0.116, depending on your deployed version.
  • For Tomcat 8.5.38‑8.5.100 and 7.0.100‑7.0.109, consider disabling the EncryptInterceptor component if it is not needed or apply a later patch once available before proceeding with an upgrade.
  • Monitor application logs for unexpected decryption failures or error patterns that could indicate probing attempts and block associated IPs as a temporary countermeasure.

Generated by OpenCVE AI on April 14, 2026 at 15:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-h468-7pvh-8vr8 Apache Tomcat: Padding Oracle vulnerability in EncryptInterceptor
History

Tue, 14 Apr 2026 13:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*

Fri, 10 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-209
CWE-642
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1240
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

threat_severity

Important


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache tomcat
Vendors & Products Apache
Apache tomcat

Fri, 10 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
References

Thu, 09 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109. Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.
Title Apache Tomcat: EncryptInterceptor vulnerable to padding oracle attack by default
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-10T18:17:59.908Z

Reserved: 2026-03-04T10:35:55.231Z

Link: CVE-2026-29146

cve-icon Vulnrichment

Updated: 2026-04-09T23:15:51.111Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-09T20:16:24.577

Modified: 2026-04-14T12:56:21.453

Link: CVE-2026-29146

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-09T19:21:57Z

Links: CVE-2026-29146 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:36:51Z

Weaknesses