VYPR
Medium severity5.3NVD Advisory· Published Apr 9, 2026· Updated Apr 14, 2026

CVE-2026-32990

CVE-2026-32990

Description

Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614.

This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115.

Users are recommended to upgrade to version 11.0.20, 10.1.53 or 9.0.116, which fix the issue.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Improper Input Validation in Apache Tomcat branches 11.0.x, 10.1.x, and 9.0.x due to an incomplete fix for CVE-2025-66614, allowing potential data manipulation.

CVE-2026-32990 describes an improper input validation vulnerability in Apache Tomcat, stemming from an incomplete fix of a previous flaw, CVE-2025-66614. This issue affects specific versions across the 11.0.x, 10.1.x, and 9.0.x branches, and can lead to unexpected behavior due to insufficient validation of certain inputs [1][4].

Root

Cause and Attack Vector The vulnerability originates from the failure to fully address input validation gaps in the prior patch, leaving a surface that may be exploitable without authentication in some configurations. An attacker with network access to a vulnerable Tomcat instance could craft requests with malformed data to manipulate internal processing [2][3].

Impact

The lack of proper input validation could allow an attacker to alter the intended logic of the application, leading to data corruption or bypass of security controls. While not resulting in direct code execution, the flaw can undermine the integrity of data handled by Tomcat [4].

Mitigation

Users should upgrade to fixed versions: 11.0.20, 10.1.53, or 9.0.116 to fully remediate the issue. No workarounds are documented, applying the vendor-supplied patch is the recommended action [1][2][3]. The vulnerability is rated Medium with a CVSS v3 base score of 5.3.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.tomcat:tomcat-coyoteMaven
>= 9.0.113, < 9.0.1169.0.116
org.apache.tomcat:tomcat-coyoteMaven
>= 10.1.50, < 10.1.5310.1.53
org.apache.tomcat:tomcat-coyoteMaven
>= 11.0.15, < 11.0.2011.0.20
org.apache.tomcat:tomcatMaven
>= 9.0.113, < 9.0.1169.0.116
org.apache.tomcat:tomcatMaven
>= 10.1.50, < 10.1.5310.1.53
org.apache.tomcat:tomcatMaven
>= 11.0.15, < 11.0.2011.0.20
org.apache.tomcat.embed:tomcat-embed-coreMaven
>= 9.0.113, < 9.0.1169.0.116
org.apache.tomcat.embed:tomcat-embed-coreMaven
>= 10.1.50, < 10.1.5310.1.53
org.apache.tomcat.embed:tomcat-embed-coreMaven
>= 11.0.15, < 11.0.2011.0.20

Affected products

2
  • Apache/Tomcat2 versions
    cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*range: >=9.0.113,<9.0.116
    • (no CPE)range: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9.0.115

Patches

3
95f7778248ca

Fix case sensitive handling of the protocol host name

https://github.com/apache/tomcatremmMar 16, 2026via ghsa
2 files changed · +5 1
  • java/org/apache/tomcat/util/net/AbstractEndpoint.java+2 1 modified
    @@ -548,7 +548,8 @@ protected SSLHostConfig getSSLHostConfig(String sniHostName) {
         public boolean checkSni(String sniHostName, String protocolHostName) {
             return (!strictSni || !isSSLEnabled()
                     || (sniHostName != null && sniHostName.equalsIgnoreCase(protocolHostName))
    -                || getSSLHostConfig(sniHostName) == getSSLHostConfig(protocolHostName));
    +                || getSSLHostConfig(sniHostName) == getSSLHostConfig(
    +                        protocolHostName != null ? protocolHostName.toLowerCase(Locale.ENGLISH) : null));
         }
     
     
    
  • webapps/docs/changelog.xml+3 0 modified
    @@ -225,6 +225,9 @@
             Report handshake issues as <code>SSLException</code> in the FFM
             code, rather than <code>IllegalStateException</code>. (remm)
           </fix>
    +      <fix>
    +        Fix case sensitive handling of the protocol host name. (remm)
    +      </fix>
         </changelog>
       </subsection>
       <subsection name="Jasper">
    
021d1f833e38

Fix case sensitive handling of the protocol host name

https://github.com/apache/tomcatremmMar 16, 2026via ghsa
2 files changed · +5 1
  • java/org/apache/tomcat/util/net/AbstractEndpoint.java+2 1 modified
    @@ -743,7 +743,8 @@ protected SSLHostConfig getSSLHostConfig(String sniHostName) {
         public boolean checkSni(String sniHostName, String protocolHostName) {
             return (!strictSni || !isSSLEnabled()
                     || (sniHostName != null && sniHostName.equalsIgnoreCase(protocolHostName))
    -                || getSSLHostConfig(sniHostName) == getSSLHostConfig(protocolHostName));
    +                || getSSLHostConfig(sniHostName) == getSSLHostConfig(
    +                        protocolHostName != null ? protocolHostName.toLowerCase(Locale.ENGLISH) : null));
         }
     
     
    
  • webapps/docs/changelog.xml+3 0 modified
    @@ -223,6 +223,9 @@
             Report handshake issues as <code>SSLException</code> in the FFM
             code, rather than <code>IllegalStateException</code>. (remm)
           </fix>
    +      <fix>
    +        Fix case sensitive handling of the protocol host name. (remm)
    +      </fix>
         </changelog>
       </subsection>
       <subsection name="Jasper">
    
4d0615a5c718

Fix case sensitive handling of the protocol host name

https://github.com/apache/tomcatremmMar 16, 2026via ghsa
2 files changed · +5 1
  • java/org/apache/tomcat/util/net/AbstractEndpoint.java+2 1 modified
    @@ -531,7 +531,8 @@ protected SSLHostConfig getSSLHostConfig(String sniHostName) {
         public boolean checkSni(String sniHostName, String protocolHostName) {
             return (!strictSni || !isSSLEnabled()
                     || (sniHostName != null && sniHostName.equalsIgnoreCase(protocolHostName))
    -                || getSSLHostConfig(sniHostName) == getSSLHostConfig(protocolHostName));
    +                || getSSLHostConfig(sniHostName) == getSSLHostConfig(
    +                        protocolHostName != null ? protocolHostName.toLowerCase(Locale.ENGLISH) : null));
         }
     
     
    
  • webapps/docs/changelog.xml+3 0 modified
    @@ -221,6 +221,9 @@
             Report handshake issues as <code>SSLException</code> in the FFM
             code, rather than <code>IllegalStateException</code>. (remm)
           </fix>
    +      <fix>
    +        Fix case sensitive handling of the protocol host name. (remm)
    +      </fix>
         </changelog>
       </subsection>
       <subsection name="Jasper">
    

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

10

News mentions

0

No linked articles in our index yet.