Impact
An upgrade that intended to close a prior issue introduced a flaw where the EncryptInterceptor in Apache Tomcat is bypassed, leaving sensitive data unencrypted. This missing encryption can allow an attacker to read data that should otherwise be protected, making it a confidentiality risk. The flaw is classified as CWE‑311, Missing Encryption of Sensitive Data, and involves resource handling weaknesses per CWE‑807.
Affected Systems
The vulnerability affects Apache Tomcat versions 11.0.20, 10.1.53, and 9.0.116. Users running these releases are advised to upgrade to the next minor releases—11.0.21 for version 11.x, 10.1.54 for 10.x, and 9.0.117 for 9.x—as these patches resolve the encryption bypass.
Risk and Exploitability
The issue carries a CVSS score of 7.5, indicating a high severity, while the EPSS score is less than 1 percent, implying a low likelihood of exploitation in the wild. It is not listed in the CISA KEV catalog. The attack vector is inferred to be remote, likely over HTTP or HTTPS connections, since the vulnerability arises during request handling and could be triggered by crafted requests.
OpenCVE Enrichment
Github GHSA