Author: markt
Date: Tue Feb 17 18:18:29 2026
New Revision: 1931909

Log:
Add CVE-2025-66614, CVE-2026-24733, CVE-2026-27434

Modified:
   tomcat/site/trunk/docs/security-10.html
   tomcat/site/trunk/docs/security-11.html
   tomcat/site/trunk/docs/security-9.html
   tomcat/site/trunk/docs/security-native.html
   tomcat/site/trunk/xdocs/security-10.xml
   tomcat/site/trunk/xdocs/security-11.xml
   tomcat/site/trunk/xdocs/security-9.xml
   tomcat/site/trunk/xdocs/security-native.xml

Modified: tomcat/site/trunk/docs/security-10.html
==============================================================================
--- tomcat/site/trunk/docs/security-10.html     Tue Feb 17 18:08:12 2026        
(r1931908)
+++ tomcat/site/trunk/docs/security-10.html     Tue Feb 17 18:18:29 2026        
(r1931909)
@@ -42,7 +42,64 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.47">Fixed in Apache Tomcat 
10.1.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.45">Fixed in Apache 
Tomcat 10.1.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.44">Fixed in 
Apache Tomcat 10.1.44</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.43">Fixed in Apache Tomcat 
10.1.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.42">Fixed in Apache 
Tomcat 10.1.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.41">Fixed in 
Apache Tomcat 10.1.41</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.40">Fixed in Apache Tomcat 
10.1.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in Apache 
Tomcat 10.1.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in 
Apache Tomcat 10.1.34</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in Apache Tomcat 
10.1.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache 
Tomcat 10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in
  Apache Tomcat 10.1.25</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in Apache Tomcat 
10.1.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache 
Tomcat 10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in 
Apache Tomcat 10.1.14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in Apache Tomcat 
10.1.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache 
Tomcat 10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in 
Apache Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed 
in Apache Tomcat 10.1.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed in Apache Tomcat 
10.1.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache 
Tomcat 10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.1">Fixed in 
Apache Tomcat 10.1.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 
10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2
 3">Fixed in Apache Tomcat 10.0.23</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed in Apache Tomcat 
10.1.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in 
Apache Tomcat 10.0.21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in Apache Tomcat 
10.1.0-M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in 
Apache Tomcat 10.0.20</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in Apache Tomcat 
10.1.0-M14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in 
Apache Tomcat 10.0.16</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in Apache Tomcat 
10.1.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in 
Apache Tomcat 10.0.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache Tomcat 
10.1.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache 
Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in 
Apache Tomcat 10.0.6</a><
 /li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 
10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed in Apache 
Tomcat 10.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in 
Apache Tomcat 10.0.2</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 
10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in 
Apache Tomcat 10.0.0-M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in 
Apache Tomcat 10.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 
10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_10.1.52">Fixed in Apache Tomcat 
10.1.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.50">Fixed in Apache 
Tomcat 10.1.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.47">Fixed in 
Apache Tomcat 10.1.47</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.45">Fixed in Apache Tomcat 
10.1.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.44">Fixed in Apache 
Tomcat 10.1.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.43">Fixed in 
Apache Tomcat 10.1.43</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.42">Fixed in Apache Tomcat 
10.1.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.41">Fixed in Apache 
Tomcat 10.1.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.40">Fixed in 
Apache Tomcat 10.1.40</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.35">Fixed in Apache Tomcat 
10.1.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.34">Fixed in Apache 
Tomcat 10.1.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.33">Fixed in
  Apache Tomcat 10.1.33</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.31">Fixed in Apache Tomcat 
10.1.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.25">Fixed in Apache 
Tomcat 10.1.25</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.19">Fixed in 
Apache Tomcat 10.1.19</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.16">Fixed in Apache Tomcat 
10.1.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.14">Fixed in Apache 
Tomcat 10.1.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.13">Fixed in 
Apache Tomcat 10.1.13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.9">Fixed in Apache Tomcat 
10.1.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.8">Fixed in Apache 
Tomcat 10.1.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.6">Fixed in 
Apache Tomcat 10.1.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.5">Fixed 
in Apache Tomcat 10.1.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.1.2">Fixed in Apache Tomcat 
10.1.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1
 .1">Fixed in Apache Tomcat 10.1.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.27">Fixed in Apache Tomcat 
10.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.23">Fixed in Apache 
Tomcat 10.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M17">Fixed 
in Apache Tomcat 10.1.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.21">Fixed in Apache Tomcat 
10.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M15">Fixed in 
Apache Tomcat 10.1.0-M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.20">Fixed in Apache Tomcat 
10.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M14">Fixed in 
Apache Tomcat 10.1.0-M14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.16">Fixed in Apache Tomcat 
10.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M10">Fixed in 
Apache Tomcat 10.1.0-M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.12">Fixed in Apache Tomcat 
10.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.1.0-M6">Fixed in Apache 
Tomcat 10.1.0-M6<
 /a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in Apache Tomcat 
10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed in Apache 
Tomcat 10.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in 
Apache Tomcat 10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.4">Fixed 
in Apache Tomcat 10.0.4</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache Tomcat 
10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache 
Tomcat 10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed 
in Apache Tomcat 10.0.0-M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in 
Apache Tomcat 10.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 
10.0.0-M5</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_10.1.52"><span 
class="pull-right">2026-01-27</span> Fixed in Apache Tomcat 10.1.52</h3><div 
class="text">
+
+    <p><strong>Moderate: Incomplete OCSP verification checks</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24734"; 
rel="nofollow">CVE-2026-24734</a></p>
+
+    <p>When using an OCSP responder, Tomcat's FFM integration with OpenSSL did
+       not complete verification or freshness checks on the OCSP response which
+       could allow certificate revocation to be bypassed.</p>
+
+    <p>Affects: 10.1.0-M7 to 10.1.51</p>
+
+    <p>This issue was reported to the Tomcat security team on 2 November 2025.
+       The issue was made public on 17 February 2026.</p>
+
+  </div><h3 id="Fixed_in_Apache_Tomcat_10.1.50"><span 
class="pull-right">2025-12-08</span> Fixed in Apache Tomcat 10.1.50</h3><div 
class="text">
+
+    <p><strong>Low: Security constraint bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24733"; 
rel="nofollow">CVE-2026-24733</a></p>
+
+    <p>Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
+       constraint was configured to allow HEAD requests to a URI but deny GET
+       requests, the user could bypass that constraint on GET requests by
+       sending a (specification invalid) HEAD request using HTTP/0.9.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/711b465cf22684a1acf0cb43501cdbbce9b6c5f4";>711b465c</a>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 26 November
+       2025. The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.49</p>
+
+    <p><strong>Moderate: Client certificate verification bypass due to virtual
+       host mapping</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614"; 
rel="nofollow">CVE-2025-66614</a></p>
+
+    <p>Tomcat did not validate that the host name provided via the SNI 
extension
+       was the same as the host name provided in the HTTP host header field. If
+       Tomcat was configured with more than one virtual host and the TLS
+       configuration for one of those hosts did not require client certificate
+       authentication but another one did, it was possible for a client to
+       bypass the client certificate authentication by sending different host
+       names in the SNI extension and the HTTP host header field.</p>
+
+    <p>The vulnerability only applies if client certificate authentication is
+       only enforced at the Connector. It does not apply if client certificate
+       authentication is enforced at the web application.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/972f9a5e2a07674d92610c478aac1b205d60724e";>972f9a5e</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/5053fa82a1b2b52756810601227984a8b71888a4";>5053fa82</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 15 October 2025.
+       The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.49</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_10.1.47"><span 
class="pull-right">2025-10-07</span> Fixed in Apache Tomcat 10.1.47</h3><div 
class="text">
 
     <p><strong>Low: Delayed cleaning of multipart upload temporary files may

Modified: tomcat/site/trunk/docs/security-11.html
==============================================================================
--- tomcat/site/trunk/docs/security-11.html     Tue Feb 17 18:08:12 2026        
(r1931908)
+++ tomcat/site/trunk/docs/security-11.html     Tue Feb 17 18:18:29 2026        
(r1931909)
@@ -36,7 +36,63 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.12">Fixed in Apache Tomcat 
11.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.11">Fixed in Apache 
Tomcat 11.0.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.10">Fixed in 
Apache Tomcat 11.0.10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.9">Fixed in Apache Tomcat 
11.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.8">Fixed in Apache 
Tomcat 11.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.7">Fixed in 
Apache Tomcat 11.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.6">Fixed 
in Apache Tomcat 11.0.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in Apache Tomcat 
11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed in Apache 
Tomcat 11.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in 
Apache Tomcat 11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed 
in Apache Tomcat 11.0.0</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in Apache Tomca
 t 11.0.0-M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in 
Apache Tomcat 11.0.0-M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in Apache Tomcat 
11.0.0-M12</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in 
Apache Tomcat 11.0.0-M11</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in Apache Tomcat 
11.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in 
Apache Tomcat 11.0.0-M5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in Apache Tomcat 
11.0.0-M3</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_11.0.18">Fixed in Apache Tomcat 
11.0.18</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.15">Fixed in Apache 
Tomcat 11.0.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.12">Fixed in 
Apache Tomcat 11.0.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.11">Fixed in Apache Tomcat 
11.0.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.10">Fixed in Apache 
Tomcat 11.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.9">Fixed in 
Apache Tomcat 11.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.8">Fixed 
in Apache Tomcat 11.0.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.7">Fixed in Apache Tomcat 
11.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.6">Fixed in Apache 
Tomcat 11.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.3">Fixed in 
Apache Tomcat 11.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.2">Fixed 
in Apache Tomcat 11.0.2</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.1">Fixed in Apache Tomca
 t 11.0.1</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0">Fixed in Apache 
Tomcat 11.0.0</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M21">Fixed in 
Apache Tomcat 11.0.0-M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M17">Fixed in Apache Tomcat 
11.0.0-M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M12">Fixed in 
Apache Tomcat 11.0.0-M12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M11">Fixed in Apache Tomcat 
11.0.0-M11</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M6">Fixed in 
Apache Tomcat 11.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_11.0.0-M5">Fixed in Apache Tomcat 
11.0.0-M5</a></li><li><a href="#Fixed_in_Apache_Tomcat_11.0.0-M3">Fixed in 
Apache Tomcat 11.0.0-M3</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_11.0.18"><span 
class="pull-right">2026-01-26</span> Fixed in Apache Tomcat 11.0.18</h3><div 
class="text">
+
+    <p><strong>Moderate: Incomplete OCSP verification checks</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24734"; 
rel="nofollow">CVE-2026-24734</a></p>
+
+    <p>When using an OCSP responder, Tomcat's FFM integration with OpenSSL did
+       not complete verification or freshness checks on the OCSP response which
+       could allow certificate revocation to be bypassed.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.17</p>
+
+    <p>This issue was reported to the Tomcat security team on 2 November 2025.
+       The issue was made public on 17 February 2026.</p>
+
+  </div><h3 id="Fixed_in_Apache_Tomcat_11.0.15"><span 
class="pull-right">2025-12-08</span> Fixed in Apache Tomcat 11.0.15</h3><div 
class="text">
+
+    <p><strong>Low: Security constraint bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24733"; 
rel="nofollow">CVE-2026-24733</a></p>
+
+    <p>Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
+       constraint was configured to allow HEAD requests to a URI but deny GET
+       requests, the user could bypass that constraint on GET requests by
+       sending a (specification invalid) HEAD request using HTTP/0.9.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/6c73d74ff281260d74c836370ff6b82f1da8048b";>6c73d74f</a>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 26 November
+       2025. The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.14</p>
+
+    <p><strong>Moderate: Client certificate verification bypass due to virtual
+       host mapping</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614"; 
rel="nofollow">CVE-2025-66614</a></p>
+
+    <p>Tomcat did not validate that the host name provided via the SNI 
extension
+       was the same as the host name provided in the HTTP host header field. If
+       Tomcat was configured with more than one virtual host and the TLS
+       configuration for one of those hosts did not require client certificate
+       authentication but another one did, it was possible for a client to
+       bypass the client certificate authentication by sending different host
+       names in the SNI extension and the HTTP host header field.</p>
+
+    <p>The vulnerability only applies if client certificate authentication is
+       only enforced at the Connector. It does not apply if client certificate
+       authentication is enforced at the web application.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/258a591b61f8cf5c22109e21e5a2a38b63454fd2";>258a591b</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 15 October 2025.
+       The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.14</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_11.0.12"><span 
class="pull-right">2025-10-07</span> Fixed in Apache Tomcat 11.0.12</h3><div 
class="text">
 
     <p><strong>Low: Delayed cleaning of multipart upload temporary files may

Modified: tomcat/site/trunk/docs/security-9.html
==============================================================================
--- tomcat/site/trunk/docs/security-9.html      Tue Feb 17 18:08:12 2026        
(r1931908)
+++ tomcat/site/trunk/docs/security-9.html      Tue Feb 17 18:18:29 2026        
(r1931909)
@@ -36,7 +36,65 @@
     </p>
 
   </div><h3 id="Table_of_Contents">Table of Contents</h3><div class="text">
-    <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.110">Fixed in Apache Tomcat 
9.0.110</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.109">Fixed in Apache 
Tomcat 9.0.109</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.108">Fixed in 
Apache Tomcat 9.0.108</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.107">Fixed in Apache Tomcat 
9.0.107</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.106">Fixed in Apache 
Tomcat 9.0.106</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.105">Fixed in 
Apache Tomcat 9.0.105</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.104">Fixed in Apache Tomcat 
9.0.104</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in Apache 
Tomcat 9.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in 
Apache Tomcat 9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed 
in Apache Tomcat 9.0.97</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in Apache Tomcat 
9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed in Apache T
 omcat 9.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in 
Apache Tomcat 9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed 
in Apache Tomcat 9.0.83</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in Apache Tomcat 
9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed in Apache 
Tomcat 9.0.80</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in 
Apache Tomcat 9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed 
in Apache Tomcat 9.0.74</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in Apache Tomcat 
9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed in Apache 
Tomcat 9.0.71</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in 
Apache Tomcat 9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed 
in Apache Tomcat 9.0.68</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in Apache Tomcat 
9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed in Apache To
 mcat 9.0.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in 
Apache Tomcat 9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed 
in Apache Tomcat 9.0.58</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in Apache Tomcat 
9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in Apache 
Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in 
Apache Tomcat 9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed 
in Apache Tomcat 9.0.45</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in Apache Tomcat 
9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache 
Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in 
Apache Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed 
in Apache Tomcat 9.0.38</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat 
9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache Tom
 cat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in 
Apache Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed 
in Apache Tomcat 9.0.31</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat 
9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache 
Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in 
Apache Tomcat 9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed 
in Apache Tomcat 9.0.20</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat 
9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache 
Tomcat 9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in 
Apache Tomcat 9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed 
in Apache Tomcat 9.0.10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in Apache Tomcat 
9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache 
Tomcat 
 9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache 
Tomcat 9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in 
Apache Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed 
in Apache Tomcat 9.0.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 
9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in 
Apache Tomcat 9.0.0.M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 
9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in 
Apache Tomcat 9.0.0.M18</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat 
9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in 
Apache Tomcat 9.0.0.M15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in Apache Tomcat 
9.0.0.M13</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in 
Apache Tomcat 9.0.0.M10</a></li><li><a href="#Fixed_in_Apach
 e_Tomcat_9.0.0.M8">Fixed in Apache Tomcat 9.0.0.M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 
9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+    <ul><li><a href="#Fixed_in_Apache_Tomcat_9.0.115">Fixed in Apache Tomcat 
9.0.115</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.113">Fixed in Apache 
Tomcat 9.0.113</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.110">Fixed in 
Apache Tomcat 9.0.110</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.109">Fixed in Apache Tomcat 
9.0.109</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.108">Fixed in Apache 
Tomcat 9.0.108</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.107">Fixed in 
Apache Tomcat 9.0.107</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.106">Fixed in Apache Tomcat 
9.0.106</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.105">Fixed in Apache 
Tomcat 9.0.105</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.104">Fixed in 
Apache Tomcat 9.0.104</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.99">Fixed in Apache Tomcat 
9.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.98">Fixed in Apache 
Tomcat 9.0.98</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.97">Fixed in Apac
 he Tomcat 9.0.97</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.96">Fixed in 
Apache Tomcat 9.0.96</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.90">Fixed 
in Apache Tomcat 9.0.90</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.86">Fixed in Apache Tomcat 
9.0.86</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.83">Fixed in Apache 
Tomcat 9.0.83</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.81">Fixed in 
Apache Tomcat 9.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.80">Fixed 
in Apache Tomcat 9.0.80</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.75">Fixed in Apache Tomcat 
9.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.74">Fixed in Apache 
Tomcat 9.0.74</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.72">Fixed in 
Apache Tomcat 9.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.71">Fixed 
in Apache Tomcat 9.0.71</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.69">Fixed in Apache Tomcat 
9.0.69</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.68">Fixed in Apach
 e Tomcat 9.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.65">Fixed in 
Apache Tomcat 9.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.63">Fixed 
in Apache Tomcat 9.0.63</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.62">Fixed in Apache Tomcat 
9.0.62</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.58">Fixed in Apache 
Tomcat 9.0.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.54">Fixed in 
Apache Tomcat 9.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed 
in Apache Tomcat 9.0.48</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed in Apache Tomcat 
9.0.46</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache 
Tomcat 9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.44">Fixed in 
Apache Tomcat 9.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed 
in Apache Tomcat 9.0.43</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in Apache Tomcat 
9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache
  Tomcat 9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in 
Apache Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed 
in Apache Tomcat 9.0.36</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in Apache Tomcat 
9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache 
Tomcat 9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in 
Apache Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed 
in Apache Tomcat 9.0.29</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.21">Fixed in Apache Tomcat 
9.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache 
Tomcat 9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in 
Apache Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed 
in Apache Tomcat 9.0.16</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat 
9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache 
 Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in 
Apache Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed 
in Apache Tomcat 9.0.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache Tomcat 
9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache 
Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in 
Apache Tomcat 9.0.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 
9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in 
Apache Tomcat 9.0.0.M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 
9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in 
Apache Tomcat 9.0.0.M18</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in Apache Tomcat 
9.0.0.M17</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in 
Apache Tomcat 9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat
 _9.0.0.M13">Fixed in Apache Tomcat 9.0.0.M13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 
9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in 
Apache Tomcat 9.0.0.M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 
9.0.0.M3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+  </div><h3 id="Fixed_in_Apache_Tomcat_9.0.115"><span 
class="pull-right">2026-01-23</span> Fixed in Apache Tomcat 9.0.115</h3><div 
class="text">
+
+    <p><strong>Moderate: Incomplete OCSP verification checks</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24734"; 
rel="nofollow">CVE-2026-24734</a></p>
+
+    <p>When using an OCSP responder, Tomcat's FFM integration with OpenSSL did
+       not complete verification or freshness checks on the OCSP response which
+       could allow certificate revocation to be bypassed.</p>
+
+    <p>Affects: 9.0.83 to 9.0.114</p>
+
+    <p>This issue was reported to the Tomcat security team on 2 November 2025.
+       The issue was made public on 17 February 2026.</p>
+
+  </div><h3 id="Fixed_in_Apache_Tomcat_9.0.113"><span 
class="pull-right">2025-12-07</span> Fixed in Apache Tomcat 9.0.113</h3><div 
class="text">
+
+    <p><strong>Low: Security constraint bypass</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24733"; 
rel="nofollow">CVE-2026-24733</a></p>
+
+    <p>Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
+       constraint was configured to allow HEAD requests to a URI but deny GET
+       requests, the user could bypass that constraint on GET requests by
+       sending a (specification invalid) HEAD request using HTTP/0.9.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/2e2fa23f2635bbb819759576a2f2f5e64ecf7c5f";>2e2fa23f</a>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 26 November
+       2025. The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.112</p>
+
+    <p><strong>Moderate: Client certificate verification bypass due to virtual
+       host mapping</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614"; 
rel="nofollow">CVE-2025-66614</a></p>
+
+    <p>Tomcat did not validate that the host name provided via the SNI 
extension
+       was the same as the host name provided in the HTTP host header field. If
+       Tomcat was configured with more than one virtual host and the TLS
+       configuration for one of those hosts did not require client certificate
+       authentication but another one did, it was possible for a client to
+       bypass the client certificate authentication by sending different host
+       names in the SNI extension and the HTTP host header field.</p>
+
+    <p>The vulnerability only applies if client certificate authentication is
+       only enforced at the Connector. It does not apply if client certificate
+       authentication is enforced at the web application.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/152c14885d45f5e0a8b59bd9f93c289cfe20ce30";>152c1488</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/a4aa74232e826028cd2f7ba0445caf8a8b52c509";>a4aa7423</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/9276b5e783c8cd5b3fe2bb716306b65004bdd940";>9276b5e7</a>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 15 October 2025.
+       The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.112</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_9.0.110"><span 
class="pull-right">2025-10-06</span> Fixed in Apache Tomcat 9.0.110</h3><div 
class="text">
 
     <p><strong>Low: Delayed cleaning of multipart upload temporary files may

Modified: tomcat/site/trunk/docs/security-native.html
==============================================================================
--- tomcat/site/trunk/docs/security-native.html Tue Feb 17 18:08:12 2026        
(r1931908)
+++ tomcat/site/trunk/docs/security-native.html Tue Feb 17 18:18:29 2026        
(r1931909)
@@ -1,6 +1,6 @@
 <!DOCTYPE html SYSTEM "about:legacy-compat">
 <html lang="en"><head><META http-equiv="Content-Type" content="text/html; 
charset=UTF-8"><meta name="viewport" content="width=device-width, 
initial-scale=1"><link href="res/css/tomcat.css" rel="stylesheet" 
type="text/css"><link href="res/css/fonts/fonts.css" rel="stylesheet" 
type="text/css"><title>Apache Tomcat&reg; - Apache Tomcat APR/native Connector 
vulnerabilities</title><meta name="author" content="Apache Tomcat 
Project"><script 
src="https://www.apachecon.com/event-images/snippet.js";></script></head><body><div
 id="wrapper"><header id="header"><div class="clearfix"><div 
class="menu-toggler pull-left" tabindex="1"><div 
class="hamburger"></div></div><a href="http://tomcat.apache.org/";><img 
class="tomcat-logo pull-left noPrint" alt="Tomcat Home" 
src="res/images/tomcat.png"></a><h1 class="pull-left">Apache 
Tomcat<sup>&reg;</sup></h1><div class="asf-logos pull-right"><a 
href="https://www.apache.org/foundation/contributing.html"; target="_blank" 
class="pull-left"><img src="https://www.
 apache.org/images/SupportApache-small.png" class="support-asf" alt="Support 
Apache"></a><a href="http://www.apache.org/"; target="_blank" 
class="pull-left"><img src="res/images/asf_logo_wide.svg" class="asf-logo" 
alt="The Apache Software Foundation"></a></div></div></header><main 
id="middle"><div><div id="mainLeft"><div id="nav-wrapper"><form 
action="https://www.google.com/search"; method="get"><div 
class="searchbox"><input value="tomcat.apache.org" name="sitesearch" 
type="hidden"><input aria-label="Search text" placeholder="Search&hellip;" 
required="required" name="q" id="query" 
type="search"><button>GO</button></div></form><div class="asfevents"><a 
class="acevent" data-format="square" 
data-width="150"></a></div><nav><div><h2>Apache Tomcat</h2><ul><li><a 
href="./index.html">Home</a></li><li><a 
href="./taglibs.html">Taglibs</a></li><li><a href="./maven-plugin.html">Maven 
Plugin</a></li></ul></div><div><h2>Download</h2><ul><li><a 
href="./whichversion.html">Which version?</a></li><li><a
  href="https://tomcat.apache.org/download-11.cgi";>Tomcat 11</a></li><li><a 
href="https://tomcat.apache.org/download-10.cgi";>Tomcat 10</a></li><li><a 
href="https://tomcat.apache.org/download-90.cgi";>Tomcat 9</a></li><li><a 
href="https://tomcat.apache.org/download-migration.cgi";>Tomcat Migration Tool 
for Jakarta EE</a></li><li><a 
href="https://tomcat.apache.org/download-connectors.cgi";>Tomcat 
Connectors</a></li><li><a 
href="https://tomcat.apache.org/download-native.cgi";>Tomcat 
Native</a></li><li><a 
href="https://tomcat.apache.org/download-taglibs.cgi";>Taglibs</a></li><li><a 
href="https://archive.apache.org/dist/tomcat/";>Archives</a></li></ul></div><div><h2>Documentation</h2><ul><li><a
 href="./tomcat-11.0-doc/index.html">Tomcat 11.0</a></li><li><a 
href="./tomcat-10.1-doc/index.html">Tomcat 10.1</a></li><li><a 
href="./tomcat-9.0-doc/index.html">Tomcat 9.0</a></li><li><a 
href="./upgrading.html">Upgrading</a></li><li><a 
href="./connectors-doc/index.html">Tomcat Connectors</a></li><li><a h
 ref="./native-doc/index.html">Tomcat Native 2</a></li><li><a 
href="./native-1.3-doc/index.html">Tomcat Native 1.3</a></li><li><a 
href="https://cwiki.apache.org/confluence/display/TOMCAT";>Wiki</a></li><li><a 
href="./migration.html">Migration Guide</a></li><li><a 
href="./presentations.html">Presentations</a></li><li><a 
href="https://cwiki.apache.org/confluence/x/Bi8lBg";>Specifications</a></li></ul></div><div><h2>Problems?</h2><ul><li><a
 href="./security.html">Security Reports</a></li><li><a 
href="./findhelp.html">Find help</a></li><li><a 
href="https://cwiki.apache.org/confluence/display/TOMCAT/FAQ";>FAQ</a></li><li><a
 href="./lists.html">Mailing Lists</a></li><li><a href="./bugreport.html">Bug 
Database</a></li></ul></div><div><h2>Get Involved</h2><ul><li><a 
href="./getinvolved.html">Overview</a></li><li><a href="./source.html">Source 
code</a></li><li><a href="./ci.html">Buildbot</a></li><li><a 
href="./tools.html">Tools</a></li></ul></div><div><h2>Media</h2><ul><li><a 
href="https://twit
 ter.com/theapachetomcat">Twitter</a></li><li><a 
href="https://www.youtube.com/c/ApacheTomcatOfficial";>YouTube</a></li><li><a 
href="https://blogs.apache.org/tomcat/";>Blog</a></li></ul></div><div><h2>Misc</h2><ul><li><a
 href="./whoweare.html">Who We Are</a></li><li><a 
href="https://www.redbubble.com/people/comdev/works/30885254-apache-tomcat";>Swag</a></li><li><a
 href="./heritage.html">Heritage</a></li><li><a 
href="http://www.apache.org";>Apache Home</a></li><li><a 
href="./resources.html">Resources</a></li><li><a 
href="./contact.html">Contact</a></li><li><a 
href="./legal.html">Legal</a></li><li><a 
href="https://privacy.apache.org/policies/privacy-policy-public.html";>Privacy</a></li><li><a
 href="https://www.apache.org/foundation/contributing.html";>Support 
Apache</a></li><li><a 
href="https://www.apache.org/foundation/sponsorship.html";>Sponsorship</a></li><li><a
 href="http://www.apache.org/foundation/thanks.html";>Thanks</a></li><li><a 
href="http://www.apache.org/licenses/";>License</a></li>
 </ul></div></nav></div></div><div id="mainRight"><div id="content"><h2 
style="display: none;">Content</h2><h3 id="Table_of_Contents">Table of 
Contents</h3><div class="text">
-<ul><li><a href="#Apache_Tomcat_APR/native_Connector_vulnerabilities">Apache 
Tomcat APR/native Connector vulnerabilities</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_Native_Connector_1.2.17">Fixed in Apache Tomcat 
Native Connector 1.2.17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_Native_Connector_1.2.16">Fixed in Apache Tomcat 
Native Connector 1.2.16</a></li><li><a 
href="#Not_a_vulnerability_in_the_Apache_Tomcat_APR/native_Connector">Not a 
vulnerability in the Apache Tomcat APR/native Connector</a></li></ul>
+<ul><li><a href="#Apache_Tomcat_APR/native_Connector_vulnerabilities">Apache 
Tomcat APR/native Connector vulnerabilities</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_Native_Connector_2.0.12_/_1.3.5">Fixed in Apache 
Tomcat Native Connector 2.0.12 / 1.3.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_Native_Connector_1.2.17">Fixed in Apache Tomcat 
Native Connector 1.2.17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_Native_Connector_1.2.16">Fixed in Apache Tomcat 
Native Connector 1.2.16</a></li><li><a 
href="#Not_a_vulnerability_in_the_Apache_Tomcat_APR/native_Connector">Not a 
vulnerability in the Apache Tomcat APR/native Connector</a></li></ul>
 </div><h3 id="Apache_Tomcat_APR/native_Connector_vulnerabilities">Apache 
Tomcat APR/native Connector vulnerabilities</h3><div class="text">
     <p>This page lists all security vulnerabilities fixed in released versions
        of Apache Tomcat APR/native Connector. Each vulnerability is given a
@@ -19,6 +19,20 @@
        vulnerabilities to the <a href="security.html">Tomcat
        Security Team</a>.</p>
 
+  </div><h3 id="Fixed_in_Apache_Tomcat_Native_Connector_2.0.12_/_1.3.5">Fixed 
in Apache Tomcat Native Connector 2.0.12 / 1.3.5</h3><div class="text">
+
+    <p><strong>Moderate: Incomplete OCSP verification checks</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24734"; 
rel="nofollow">CVE-2026-24734</a></p>
+
+    <p>When using an OCSP responder, Tomcat Native did complete verification or
+       freshness checks on the OCSP response which could allow certificate
+       revocation to be bypassed.</p>
+
+    <p>This issue was reported to the Tomcat security team on 2 November 2025.
+       The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 1.3.0 to 1.3.4 and 2.0.0 to 2.0.11</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_Native_Connector_1.2.17">Fixed in 
Apache Tomcat Native Connector 1.2.17</h3><div class="text">
 
     <p><strong>Moderate: Mishandled OCSP invalid response</strong>

Modified: tomcat/site/trunk/xdocs/security-10.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-10.xml     Tue Feb 17 18:08:12 2026        
(r1931908)
+++ tomcat/site/trunk/xdocs/security-10.xml     Tue Feb 17 18:18:29 2026        
(r1931909)
@@ -56,6 +56,67 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 10.1.52" rtext="2026-01-27">
+
+    <p><strong>Moderate: Incomplete OCSP verification checks</strong>
+       <cve>CVE-2026-24734</cve></p>
+
+    <p>When using an OCSP responder, Tomcat's FFM integration with OpenSSL did
+       not complete verification or freshness checks on the OCSP response which
+       could allow certificate revocation to be bypassed.</p>
+
+    <p>Affects: 10.1.0-M7 to 10.1.51</p>
+
+    <p>This issue was reported to the Tomcat security team on 2 November 2025.
+       The issue was made public on 17 February 2026.</p>
+
+  </section>
+  
+  <section name="Fixed in Apache Tomcat 10.1.50" rtext="2025-12-08">
+
+    <p><strong>Low: Security constraint bypass</strong>
+       <cve>CVE-2026-24733</cve></p>
+
+    <p>Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
+       constraint was configured to allow HEAD requests to a URI but deny GET
+       requests, the user could bypass that constraint on GET requests by
+       sending a (specification invalid) HEAD request using HTTP/0.9.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="711b465cf22684a1acf0cb43501cdbbce9b6c5f4"/>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 26 November
+       2025. The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.49</p>
+
+    <p><strong>Moderate: Client certificate verification bypass due to virtual
+       host mapping</strong>
+       <cve>CVE-2025-66614</cve></p>
+
+    <p>Tomcat did not validate that the host name provided via the SNI 
extension
+       was the same as the host name provided in the HTTP host header field. If
+       Tomcat was configured with more than one virtual host and the TLS
+       configuration for one of those hosts did not require client certificate
+       authentication but another one did, it was possible for a client to
+       bypass the client certificate authentication by sending different host
+       names in the SNI extension and the HTTP host header field.</p>
+
+    <p>The vulnerability only applies if client certificate authentication is
+       only enforced at the Connector. It does not apply if client certificate
+       authentication is enforced at the web application.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="972f9a5e2a07674d92610c478aac1b205d60724e"/> and
+       <hashlink hash="5053fa82a1b2b52756810601227984a8b71888a4"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 15 October 2025.
+       The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 10.1.0-M1 to 10.1.49</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 10.1.47" rtext="2025-10-07">
 
     <p><strong>Low: Delayed cleaning of multipart upload temporary files may

Modified: tomcat/site/trunk/xdocs/security-11.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-11.xml     Tue Feb 17 18:08:12 2026        
(r1931908)
+++ tomcat/site/trunk/xdocs/security-11.xml     Tue Feb 17 18:18:29 2026        
(r1931909)
@@ -50,6 +50,66 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 11.0.18" rtext="2026-01-26">
+
+    <p><strong>Moderate: Incomplete OCSP verification checks</strong>
+       <cve>CVE-2026-24734</cve></p>
+
+    <p>When using an OCSP responder, Tomcat's FFM integration with OpenSSL did
+       not complete verification or freshness checks on the OCSP response which
+       could allow certificate revocation to be bypassed.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.17</p>
+
+    <p>This issue was reported to the Tomcat security team on 2 November 2025.
+       The issue was made public on 17 February 2026.</p>
+
+  </section>
+  
+  <section name="Fixed in Apache Tomcat 11.0.15" rtext="2025-12-08">
+
+    <p><strong>Low: Security constraint bypass</strong>
+       <cve>CVE-2026-24733</cve></p>
+
+    <p>Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
+       constraint was configured to allow HEAD requests to a URI but deny GET
+       requests, the user could bypass that constraint on GET requests by
+       sending a (specification invalid) HEAD request using HTTP/0.9.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="6c73d74ff281260d74c836370ff6b82f1da8048b"/>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 26 November
+       2025. The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.14</p>
+
+    <p><strong>Moderate: Client certificate verification bypass due to virtual
+       host mapping</strong>
+       <cve>CVE-2025-66614</cve></p>
+
+    <p>Tomcat did not validate that the host name provided via the SNI 
extension
+       was the same as the host name provided in the HTTP host header field. If
+       Tomcat was configured with more than one virtual host and the TLS
+       configuration for one of those hosts did not require client certificate
+       authentication but another one did, it was possible for a client to
+       bypass the client certificate authentication by sending different host
+       names in the SNI extension and the HTTP host header field.</p>
+
+    <p>The vulnerability only applies if client certificate authentication is
+       only enforced at the Connector. It does not apply if client certificate
+       authentication is enforced at the web application.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="258a591b61f8cf5c22109e21e5a2a38b63454fd2"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 15 October 2025.
+       The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 11.0.0-M1 to 11.0.14</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 11.0.12" rtext="2025-10-07">
 
     <p><strong>Low: Delayed cleaning of multipart upload temporary files may

Modified: tomcat/site/trunk/xdocs/security-9.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml      Tue Feb 17 18:08:12 2026        
(r1931908)
+++ tomcat/site/trunk/xdocs/security-9.xml      Tue Feb 17 18:18:29 2026        
(r1931909)
@@ -50,6 +50,68 @@
     <toc/>
   </section>
 
+  <section name="Fixed in Apache Tomcat 9.0.115" rtext="2026-01-23">
+
+    <p><strong>Moderate: Incomplete OCSP verification checks</strong>
+       <cve>CVE-2026-24734</cve></p>
+
+    <p>When using an OCSP responder, Tomcat's FFM integration with OpenSSL did
+       not complete verification or freshness checks on the OCSP response which
+       could allow certificate revocation to be bypassed.</p>
+
+    <p>Affects: 9.0.83 to 9.0.114</p>
+
+    <p>This issue was reported to the Tomcat security team on 2 November 2025.
+       The issue was made public on 17 February 2026.</p>
+
+  </section>
+  
+  <section name="Fixed in Apache Tomcat 9.0.113" rtext="2025-12-07">
+
+    <p><strong>Low: Security constraint bypass</strong>
+       <cve>CVE-2026-24733</cve></p>
+
+    <p>Tomcat did not limit HTTP/0.9 requests to the GET method. If a security
+       constraint was configured to allow HEAD requests to a URI but deny GET
+       requests, the user could bypass that constraint on GET requests by
+       sending a (specification invalid) HEAD request using HTTP/0.9.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="2e2fa23f2635bbb819759576a2f2f5e64ecf7c5f"/>.</p>
+
+    <p>This issue was identified by the Tomcat security team on 26 November
+       2025. The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.112</p>
+
+    <p><strong>Moderate: Client certificate verification bypass due to virtual
+       host mapping</strong>
+       <cve>CVE-2025-66614</cve></p>
+
+    <p>Tomcat did not validate that the host name provided via the SNI 
extension
+       was the same as the host name provided in the HTTP host header field. If
+       Tomcat was configured with more than one virtual host and the TLS
+       configuration for one of those hosts did not require client certificate
+       authentication but another one did, it was possible for a client to
+       bypass the client certificate authentication by sending different host
+       names in the SNI extension and the HTTP host header field.</p>
+
+    <p>The vulnerability only applies if client certificate authentication is
+       only enforced at the Connector. It does not apply if client certificate
+       authentication is enforced at the web application.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="152c14885d45f5e0a8b59bd9f93c289cfe20ce30"/>,
+       <hashlink hash="a4aa74232e826028cd2f7ba0445caf8a8b52c509"/> and
+       <hashlink hash="9276b5e783c8cd5b3fe2bb716306b65004bdd940"/>.</p>
+
+    <p>This issue was reported to the Tomcat security team on 15 October 2025.
+       The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.112</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat 9.0.110" rtext="2025-10-06">
 
     <p><strong>Low: Delayed cleaning of multipart upload temporary files may

Modified: tomcat/site/trunk/xdocs/security-native.xml
==============================================================================
--- tomcat/site/trunk/xdocs/security-native.xml Tue Feb 17 18:08:12 2026        
(r1931908)
+++ tomcat/site/trunk/xdocs/security-native.xml Tue Feb 17 18:18:29 2026        
(r1931909)
@@ -32,6 +32,22 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat Native Connector 2.0.12 / 1.3.5">
+
+    <p><strong>Moderate: Incomplete OCSP verification checks</strong>
+       <cve>CVE-2026-24734</cve></p>
+
+    <p>When using an OCSP responder, Tomcat Native did complete verification or
+       freshness checks on the OCSP response which could allow certificate
+       revocation to be bypassed.</p>
+
+    <p>This issue was reported to the Tomcat security team on 2 November 2025.
+       The issue was made public on 17 February 2026.</p>
+
+    <p>Affects: 1.3.0 to 1.3.4 and 2.0.0 to 2.0.11</p>
+
+  </section>
+
   <section name="Fixed in Apache Tomcat Native Connector 1.2.17">
 
     <p><strong>Moderate: Mishandled OCSP invalid response</strong>


---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to