Description
Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.

Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.
Published: 2026-04-09
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality Breach via Decryption
Action: Immediate Patch
AI Analysis

Impact

Padding oracle vulnerability was discovered in Apache Tomcat’s EncryptInterceptor when it is enabled with default configuration. The flaw allows an attacker who can influence the encrypted data to discover the padding used during decryption, and by sending a sequence of crafted requests can gradually learn the plaintext or determine valid padding. This can expose sensitive information stored in session cookies or other data that the interceptor encrypts, leading to a confidentiality breach. The weakness corresponds to improper handling of cryptographic padding and can be classified under cryptographic failures that enable decryption of protected data.

Affected Systems

The issue is present in Apache Tomcat versions from 7.0.100 up to 7.0.109, 8.5.38 to 8.5.100, 9.0.13 to 9.0.115, 10.0.0-M1 to 10.1.52, and 11.0.0-M1 to 11.0.18. Upgrading to Tomcat 11.0.19, 10.1.53, or 9.0.116, or later releases, removes the vulnerability. Only systems running the affected range with the EncryptInterceptor active in its default mode are impacted.

Risk and Exploitability

The CVSS score is not provided in the available data, and the EPSS score is unavailable. Because the vulnerability requires only the ability to submit requests to the interceptor, the attack vector is most likely over HTTP or HTTPS, and the attacker does not need privileged access. The lack of publicly available exploitation scripts suggests that active exploitation may be limited, yet the potential for decryption of confidential data makes the risk significant for exposed applications. The vulnerability is not listed in the KEV catalog, but its impact on data confidentiality warrants immediate attention.

Generated by OpenCVE AI on April 9, 2026 at 20:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Apache Tomcat to version 11.0.19, 10.1.53, 9.0.116, or any newer release that contains the fix.

Generated by OpenCVE AI on April 9, 2026 at 20:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-h468-7pvh-8vr8 Apache Tomcat: Padding Oracle vulnerability in EncryptInterceptor
History

Fri, 10 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-209
CWE-642
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 10 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1240
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

threat_severity

Important


Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache tomcat
Vendors & Products Apache
Apache tomcat

Fri, 10 Apr 2026 00:30:00 +0000

Type Values Removed Values Added
References

Thu, 09 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109. Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.
Title Apache Tomcat: EncryptInterceptor vulnerable to padding oracle attack by default
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-10T18:17:59.908Z

Reserved: 2026-03-04T10:35:55.231Z

Link: CVE-2026-29146

cve-icon Vulnrichment

Updated: 2026-04-09T23:15:51.111Z

cve-icon NVD

Status : Received

Published: 2026-04-09T20:16:24.577

Modified: 2026-04-10T19:16:21.970

Link: CVE-2026-29146

cve-icon Redhat

Severity : Important

Publid Date: 2026-04-09T19:21:57Z

Links: CVE-2026-29146 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:29:40Z

Weaknesses