<reportApi _class='io.jenkins.plugins.analysis.core.restapi.ReportApi'><issue><addedAt>0</addedAt><authorEmail>-</authorEmail><authorName>-</authorName><baseName>catalina.jar</baseName><category></category><columnEnd>0</columnEnd><columnStart>0</columnStart><commit>-</commit><description></description><fileName>/usr/local/tomcat/lib/catalina.jar</fileName><fingerprint>FALLBACK-6a54c218</fingerprint><lineEnd>1</lineEnd><lineStart>1</lineStart><message>CVE-2026-24880: LanguageSpecificPackageVulnerability

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response S ...

For additional help see: **Vulnerability CVE-2026-24880**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.52, 11.0.20|[CVE-2026-24880](https://avd.aquasec.com/nvd/cve-2026-24880)|

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may also be affected.

Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-24880
Severity: HIGH
Fixed Version: 9.0.116, 10.1.52, 11.0.20
Link: [CVE-2026-24880](https://avd.aquasec.com/nvd/cve-2026-24880)</message><moduleName></moduleName><origin>trivy</origin><originName>Trivy Security Scanner</originName><packageName>-</packageName><reference>1398</reference><severity>HIGH</severity><toString>catalina.jar(1,0): CVE-2026-24880: : CVE-2026-24880: LanguageSpecificPackageVulnerability

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response S ...

For additional help see: **Vulnerability CVE-2026-24880**
| Severity | Package | Fixed Version | Link |
| --- | --- | --- | --- |
|HIGH|org.apache.tomcat:tomcat-catalina|9.0.116, 10.1.52, 11.0.20|[CVE-2026-24880](https://avd.aquasec.com/nvd/cve-2026-24880)|

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Apache Tomcat via invalid chunk extension.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.1.0-M1 through 10.1.52, from 9.0.0.M1 through 9.0.115, from 8.5.0 through 8.5.100, from 7.0.0 through 7.0.109.
Other, unsupported versions may also be affected.

Users are recommended to upgrade to version 11.0.20, 10.1.52 or 9.0.116, which fix the issue.

Package: org.apache.tomcat:tomcat-catalina
Installed Version: 9.0.115
Vulnerability CVE-2026-24880
Severity: HIGH
Fixed Version: 9.0.116, 10.1.52, 11.0.20
Link: [CVE-2026-24880](https://avd.aquasec.com/nvd/cve-2026-24880)</toString><type>CVE-2026-24880</type></issue><size>1</size><toString>1 warning (high: 1)</toString></reportApi>