<reportApi _class='io.jenkins.plugins.analysis.core.restapi.ReportApi'><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>catalina.jar</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/usr/local/tomcat/lib/catalina.jar</fileName><fingerprint>FALLBACK-6a54c218</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-24880: LanguageSpecificPackageVulnerability

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response S ...

For additional help see: **Vulnerability CVE-2026-24880**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.52, 11.0.20|[CVE-2026-24880](https://avd.aquasec.com/nvd/cve-2026-24880)|

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may also be affected.

Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-24880
Severity: HIGH
Fixed Version: 9.0.116, 10.1.52, 11.0.20
Link: [CVE-2026-24880](https://avd.aquasec.com/nvd/cve-2026-24880)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>HIGH</severity><toString>catalina.jar(1,0): CVE-2026-24880: : CVE-2026-24880: LanguageSpecificPackageVulnerability

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response S ...

For additional help see: **Vulnerability CVE-2026-24880**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.52, 11.0.20|[CVE-2026-24880](https://avd.aquasec.com/nvd/cve-2026-24880)|

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may also be affected.

Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-24880
Severity: HIGH
Fixed Version: 9.0.116, 10.1.52, 11.0.20
Link: [CVE-2026-24880](https://avd.aquasec.com/nvd/cve-2026-24880)</toString><type>CVE-2026-24880</type></issue><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>catalina.jar</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/usr/local/tomcat/lib/catalina.jar</fileName><fingerprint>FALLBACK-82411fbb</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-25854: LanguageSpecificPackageVulnerability

Occasional URL redirection to untrusted Site ('Open Redirect') vulnera ...

For additional help see: **Vulnerability CVE-2026-25854**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|MEDIUM|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.53, 11.0.20|[CVE-2026-25854](https://avd.aquasec.com/nvd/cve-2026-25854)|

Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100.
Other, unsupported versions may also be affected

Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-25854
Severity: MEDIUM
Fixed Version: 9.0.116, 10.1.53, 11.0.20
Link: [CVE-2026-25854](https://avd.aquasec.com/nvd/cve-2026-25854)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>NORMAL</severity><toString>catalina.jar(1,0): CVE-2026-25854: : CVE-2026-25854: LanguageSpecificPackageVulnerability

Occasional URL redirection to untrusted Site ('Open Redirect') vulnera ...

For additional help see: **Vulnerability CVE-2026-25854**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|MEDIUM|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.53, 11.0.20|[CVE-2026-25854](https://avd.aquasec.com/nvd/cve-2026-25854)|

Occasional URL redirection to untrusted Site ('Open Redirect') vulnerability in Apache Tomcat via the LoadBalancerDrainingValve.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M23 through 9.0.115, from 8.5.30 through 8.5.100.
Other, unsupported versions may also be affected

Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-25854
Severity: MEDIUM
Fixed Version: 9.0.116, 10.1.53, 11.0.20
Link: [CVE-2026-25854](https://avd.aquasec.com/nvd/cve-2026-25854)</toString><type>CVE-2026-25854</type></issue><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>catalina.jar</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/usr/local/tomcat/lib/catalina.jar</fileName><fingerprint>FALLBACK-66a9e9cb</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-29129: LanguageSpecificPackageVulnerability

Configured cipher preference order not preserved vulnerability in Apac ...

For additional help see: **Vulnerability CVE-2026-29129**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.53, 11.0.20|[CVE-2026-29129](https://avd.aquasec.com/nvd/cve-2026-29129)|

Configured cipher preference order not preserved vulnerability in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115.

Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-29129
Severity: HIGH
Fixed Version: 9.0.116, 10.1.53, 11.0.20
Link: [CVE-2026-29129](https://avd.aquasec.com/nvd/cve-2026-29129)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>HIGH</severity><toString>catalina.jar(1,0): CVE-2026-29129: : CVE-2026-29129: LanguageSpecificPackageVulnerability

Configured cipher preference order not preserved vulnerability in Apac ...

For additional help see: **Vulnerability CVE-2026-29129**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.53, 11.0.20|[CVE-2026-29129](https://avd.aquasec.com/nvd/cve-2026-29129)|

Configured cipher preference order not preserved vulnerability in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.16 through 11.0.18, from 10.1.51 through 10.1.52, from 9.0.114 through 9.0.115.

Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-29129
Severity: HIGH
Fixed Version: 9.0.116, 10.1.53, 11.0.20
Link: [CVE-2026-29129](https://avd.aquasec.com/nvd/cve-2026-29129)</toString><type>CVE-2026-29129</type></issue><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>catalina.jar</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/usr/local/tomcat/lib/catalina.jar</fileName><fingerprint>FALLBACK-6d249065</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-29145: LanguageSpecificPackageVulnerability

CLIENT_CERT authentication does not fail as expected for some scenario ...

For additional help see: **Vulnerability CVE-2026-29145**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|CRITICAL|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.53, 11.0.20|[CVE-2026-29145](https://avd.aquasec.com/nvd/cve-2026-29145)|

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13.

Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and 9.0.116, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-29145
Severity: CRITICAL
Fixed Version: 9.0.116, 10.1.53, 11.0.20
Link: [CVE-2026-29145](https://avd.aquasec.com/nvd/cve-2026-29145)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>HIGH</severity><toString>catalina.jar(1,0): CVE-2026-29145: : CVE-2026-29145: LanguageSpecificPackageVulnerability

CLIENT_CERT authentication does not fail as expected for some scenario ...

For additional help see: **Vulnerability CVE-2026-29145**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|CRITICAL|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.53, 11.0.20|[CVE-2026-29145](https://avd.aquasec.com/nvd/cve-2026-29145)|

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled vulnerability in Apache Tomcat, Apache Tomcat Native.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M7 through 10.1.52, from 9.0.83 through 9.0.115; Apache Tomcat Native: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39, from 1.3.0 through 1.3.6, from 2.0.0 through 2.0.13.

Users are recommended to upgrade to version Tomcat Native 1.3.7 or 2.0.14 and Tomcat 11.0.20, 10.1.53 and 9.0.116, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-29145
Severity: CRITICAL
Fixed Version: 9.0.116, 10.1.53, 11.0.20
Link: [CVE-2026-29145](https://avd.aquasec.com/nvd/cve-2026-29145)</toString><type>CVE-2026-29145</type></issue><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>catalina.jar</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/usr/local/tomcat/lib/catalina.jar</fileName><fingerprint>FALLBACK-6d412956</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-29146: LanguageSpecificPackageVulnerability

Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor wit ...

For additional help see: **Vulnerability CVE-2026-29146**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.53, 11.0.19|[CVE-2026-29146](https://avd.aquasec.com/nvd/cve-2026-29146)|

Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.

Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-29146
Severity: HIGH
Fixed Version: 9.0.116, 10.1.53, 11.0.19
Link: [CVE-2026-29146](https://avd.aquasec.com/nvd/cve-2026-29146)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>HIGH</severity><toString>catalina.jar(1,0): CVE-2026-29146: : CVE-2026-29146: LanguageSpecificPackageVulnerability

Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor wit ...

For additional help see: **Vulnerability CVE-2026-29146**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.53, 11.0.19|[CVE-2026-29146](https://avd.aquasec.com/nvd/cve-2026-29146)|

Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109.

Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-29146
Severity: HIGH
Fixed Version: 9.0.116, 10.1.53, 11.0.19
Link: [CVE-2026-29146](https://avd.aquasec.com/nvd/cve-2026-29146)</toString><type>CVE-2026-29146</type></issue><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>catalina.jar</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/usr/local/tomcat/lib/catalina.jar</fileName><fingerprint>FALLBACK-f899c988</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-32990: LanguageSpecificPackageVulnerability

Improper Input Validation vulnerability in Apache Tomcat due to an inc ...

For additional help see: **Vulnerability CVE-2026-32990**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|MEDIUM|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.53, 11.0.20|[CVE-2026-32990](https://avd.aquasec.com/nvd/cve-2026-32990)|

Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614.

This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115.

Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-32990
Severity: MEDIUM
Fixed Version: 9.0.116, 10.1.53, 11.0.20
Link: [CVE-2026-32990](https://avd.aquasec.com/nvd/cve-2026-32990)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>NORMAL</severity><toString>catalina.jar(1,0): CVE-2026-32990: : CVE-2026-32990: LanguageSpecificPackageVulnerability

Improper Input Validation vulnerability in Apache Tomcat due to an inc ...

For additional help see: **Vulnerability CVE-2026-32990**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|MEDIUM|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.53, 11.0.20|[CVE-2026-32990](https://avd.aquasec.com/nvd/cve-2026-32990)|

Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614.

This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115.

Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-32990
Severity: MEDIUM
Fixed Version: 9.0.116, 10.1.53, 11.0.20
Link: [CVE-2026-32990](https://avd.aquasec.com/nvd/cve-2026-32990)</toString><type>CVE-2026-32990</type></issue><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>catalina.jar</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/usr/local/tomcat/lib/catalina.jar</fileName><fingerprint>FALLBACK-ba96c298</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-34483: LanguageSpecificPackageVulnerability

Improper Encoding or Escaping of Output vulnerability in the JsonAcces ...

For additional help see: **Vulnerability CVE-2026-34483**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.54, 11.0.21|[CVE-2026-34483](https://avd.aquasec.com/nvd/cve-2026-34483)|

Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.

Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 , which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-34483
Severity: HIGH
Fixed Version: 9.0.116, 10.1.54, 11.0.21
Link: [CVE-2026-34483](https://avd.aquasec.com/nvd/cve-2026-34483)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>HIGH</severity><toString>catalina.jar(1,0): CVE-2026-34483: : CVE-2026-34483: LanguageSpecificPackageVulnerability

Improper Encoding or Escaping of Output vulnerability in the JsonAcces ...

For additional help see: **Vulnerability CVE-2026-34483**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.54, 11.0.21|[CVE-2026-34483](https://avd.aquasec.com/nvd/cve-2026-34483)|

Improper Encoding or Escaping of Output vulnerability in the JsonAccessLogValve component of Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.40 through 9.0.116.

Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117 , which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-34483
Severity: HIGH
Fixed Version: 9.0.116, 10.1.54, 11.0.21
Link: [CVE-2026-34483](https://avd.aquasec.com/nvd/cve-2026-34483)</toString><type>CVE-2026-34483</type></issue><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>catalina.jar</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/usr/local/tomcat/lib/catalina.jar</fileName><fingerprint>FALLBACK-bb09265c</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-34487: LanguageSpecificPackageVulnerability

Insertion of Sensitive Information into Log File vulnerability in the  ...

For additional help see: **Vulnerability CVE-2026-34487**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|org.apache.tomcat:tomcat-catalina|9.0.117, 10.1.54, 11.0.21|[CVE-2026-34487](https://avd.aquasec.com/nvd/cve-2026-34487)|

Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116.

Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-34487
Severity: HIGH
Fixed Version: 9.0.117, 10.1.54, 11.0.21
Link: [CVE-2026-34487](https://avd.aquasec.com/nvd/cve-2026-34487)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>HIGH</severity><toString>catalina.jar(1,0): CVE-2026-34487: : CVE-2026-34487: LanguageSpecificPackageVulnerability

Insertion of Sensitive Information into Log File vulnerability in the  ...

For additional help see: **Vulnerability CVE-2026-34487**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|org.apache.tomcat:tomcat-catalina|9.0.117, 10.1.54, 11.0.21|[CVE-2026-34487](https://avd.aquasec.com/nvd/cve-2026-34487)|

Insertion of Sensitive Information into Log File vulnerability in the cloud membership for clustering component of Apache Tomcat exposed the Kubernetes bearer token.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.20, from 10.1.0-M1 through 10.1.53, from 9.0.13 through 9.0.116.

Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-34487
Severity: HIGH
Fixed Version: 9.0.117, 10.1.54, 11.0.21
Link: [CVE-2026-34487](https://avd.aquasec.com/nvd/cve-2026-34487)</toString><type>CVE-2026-34487</type></issue><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>catalina.jar</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/usr/local/tomcat/lib/catalina.jar</fileName><fingerprint>FALLBACK-2bda82fb</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-34500: LanguageSpecificPackageVulnerability

CLIENT_CERT authentication does not fail as expected for some scenario ...

For additional help see: **Vulnerability CVE-2026-34500**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|MEDIUM|org.apache.tomcat:tomcat-catalina|9.0.117, 10.1.54, 11.0.21|[CVE-2026-34500](https://avd.aquasec.com/nvd/cve-2026-34500)|

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22 through 10.1.53, from 9.0.92 through 9.0.116.

Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fixes the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-34500
Severity: MEDIUM
Fixed Version: 9.0.117, 10.1.54, 11.0.21
Link: [CVE-2026-34500](https://avd.aquasec.com/nvd/cve-2026-34500)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>NORMAL</severity><toString>catalina.jar(1,0): CVE-2026-34500: : CVE-2026-34500: LanguageSpecificPackageVulnerability

CLIENT_CERT authentication does not fail as expected for some scenario ...

For additional help see: **Vulnerability CVE-2026-34500**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|MEDIUM|org.apache.tomcat:tomcat-catalina|9.0.117, 10.1.54, 11.0.21|[CVE-2026-34500](https://avd.aquasec.com/nvd/cve-2026-34500)|

CLIENT_CERT authentication does not fail as expected for some scenarios when soft fail is disabled and FFM is used in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M14 through 11.0.20, from 10.1.22 through 10.1.53, from 9.0.92 through 9.0.116.

Users are recommended to upgrade to version 11.0.21, 10.1.54 or 9.0.117, which fixes the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-34500
Severity: MEDIUM
Fixed Version: 9.0.117, 10.1.54, 11.0.21
Link: [CVE-2026-34500](https://avd.aquasec.com/nvd/cve-2026-34500)</toString><type>CVE-2026-34500</type></issue><size>9</size><toString>9 warnings (high: 6, normal: 3)</toString></reportApi>