Apache Tomcat - WebSocket authentication header exposure
High severity
GitHub Reviewed
Published
May 12, 2026
to the GitHub Advisory Database
•
Updated May 18, 2026
Package
Affected versions
< 9.0.118
>= 10.1.0-M1, < 10.1.55
>= 11.0.0-M1, < 11.0.22
Patched versions
9.0.118
10.1.55
11.0.22
< 9.0.118
>= 10.1.0-M1, < 10.1.55
>= 11.0.0-M1, < 11.0.22
9.0.118
10.1.55
11.0.22
< 9.0.118
>= 10.1.0-M1, < 10.1.55
>= 11.0.0-M1, < 11.0.22
9.0.118
10.1.55
11.0.22
Description
Published by the National Vulnerability Database
May 12, 2026
Published to the GitHub Advisory Database
May 12, 2026
Reviewed
May 18, 2026
Last updated
May 18, 2026
Versions Affected:
Apache Tomcat 11.0.0-M1 to 11.0.21
Apache Tomcat 10.1.0-M1 to 10.1.54
Apache Tomcat 9.0.2 to 9.0.117
Older, unsupported versions may also be affected
Description:
If a WebSocket request was redirected after authentication, Tomcat's
WebSocket client would present the most recent authentication header to
the redirect target host.
Mitigation:
Users of the affected versions should apply one of the following
mitigations:
Credit:
This issue was identified by lokerxx
References