{
  "_class" : "io.jenkins.plugins.analysis.core.restapi.ReportApi",
  "issues" : [
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "catalina.jar",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/usr/local/tomcat/lib/catalina.jar",
      "fingerprint" : "FALLBACK-d5dc90be",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-48988: LanguageSpecificPackageVulnerability\u000a\u000atomcat: Apache Tomcat DoS in multipart upload\u000a\u000aFor additional help see: **Vulnerability CVE-2025-48988**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|org.apache.tomcat:tomcat-catalina|11.0.8, 10.1.42, 9.0.106|[CVE-2025-48988](https://avd.aquasec.com/nvd/cve-2025-48988)|\u000a\u000aAllocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.\u000a\u000aThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\u000a\u000aUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.\u000a\u000aPackage: org.apache.tomcat:tomcat-catalina\u000aInstalled Version: 9.0.105\u000aVulnerability CVE-2025-48988\u000aSeverity: HIGH\u000aFixed Version: 11.0.8, 10.1.42, 9.0.106\u000aLink: [CVE-2025-48988](https://avd.aquasec.com/nvd/cve-2025-48988)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1252",
      "severity" : "HIGH",
      "toString" : "catalina.jar(1,0): CVE-2025-48988: : CVE-2025-48988: LanguageSpecificPackageVulnerability\u000a\u000atomcat: Apache Tomcat DoS in multipart upload\u000a\u000aFor additional help see: **Vulnerability CVE-2025-48988**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|HIGH|org.apache.tomcat:tomcat-catalina|11.0.8, 10.1.42, 9.0.106|[CVE-2025-48988](https://avd.aquasec.com/nvd/cve-2025-48988)|\u000a\u000aAllocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat.\u000a\u000aThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\u000a\u000aUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.\u000a\u000aPackage: org.apache.tomcat:tomcat-catalina\u000aInstalled Version: 9.0.105\u000aVulnerability CVE-2025-48988\u000aSeverity: HIGH\u000aFixed Version: 11.0.8, 10.1.42, 9.0.106\u000aLink: [CVE-2025-48988](https://avd.aquasec.com/nvd/cve-2025-48988)",
      "type" : "CVE-2025-48988"
    },
    {
      "addedAt" : 0,
      "authorEmail" : "-",
      "authorName" : "-",
      "baseName" : "catalina.jar",
      "category" : "",
      "columnEnd" : 0,
      "columnStart" : 0,
      "commit" : "-",
      "description" : "",
      "fileName" : "/usr/local/tomcat/lib/catalina.jar",
      "fingerprint" : "FALLBACK-87cc2ab5",
      "lineEnd" : 1,
      "lineStart" : 1,
      "message" : "CVE-2025-49125: LanguageSpecificPackageVulnerability\u000a\u000atomcat: Apache Tomcat: Security constraint bypass for pre/post-resources\u000a\u000aFor additional help see: **Vulnerability CVE-2025-49125**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|org.apache.tomcat:tomcat-catalina|11.0.8, 10.1.42, 9.0.106|[CVE-2025-49125](https://avd.aquasec.com/nvd/cve-2025-49125)|\u000a\u000aAuthentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.\u000a\u000aThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\u000a\u000aUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.\u000a\u000aPackage: org.apache.tomcat:tomcat-catalina\u000aInstalled Version: 9.0.105\u000aVulnerability CVE-2025-49125\u000aSeverity: MEDIUM\u000aFixed Version: 11.0.8, 10.1.42, 9.0.106\u000aLink: [CVE-2025-49125](https://avd.aquasec.com/nvd/cve-2025-49125)",
      "moduleName" : "",
      "origin" : "trivy",
      "originName" : "Trivy Security Scanner",
      "packageName" : "-",
      "reference" : "1252",
      "severity" : "NORMAL",
      "toString" : "catalina.jar(1,0): CVE-2025-49125: : CVE-2025-49125: LanguageSpecificPackageVulnerability\u000a\u000atomcat: Apache Tomcat: Security constraint bypass for pre/post-resources\u000a\u000aFor additional help see: **Vulnerability CVE-2025-49125**\u000a| Severity | Package | Fixed Version | Link |\u000a| --- | --- | --- | --- |\u000a|MEDIUM|org.apache.tomcat:tomcat-catalina|11.0.8, 10.1.42, 9.0.106|[CVE-2025-49125](https://avd.aquasec.com/nvd/cve-2025-49125)|\u000a\u000aAuthentication Bypass Using an Alternate Path or Channel vulnerability in Apache Tomcat.  When using PreResources or PostResources mounted other than at the root of the web application, it was possible to access those resources via an unexpected path. That path was likely not to be protected by the same security constraints as the expected path, allowing those security constraints to be bypassed.\u000a\u000aThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\u000a\u000aUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.\u000a\u000aPackage: org.apache.tomcat:tomcat-catalina\u000aInstalled Version: 9.0.105\u000aVulnerability CVE-2025-49125\u000aSeverity: MEDIUM\u000aFixed Version: 11.0.8, 10.1.42, 9.0.106\u000aLink: [CVE-2025-49125](https://avd.aquasec.com/nvd/cve-2025-49125)",
      "type" : "CVE-2025-49125"
    }
  ],
  "size" : 2,
  "toString" : "2 warnings (high: 1, normal: 1)"
}