A newly discovered vulnerability in Apache Tomcat’s Coyote component has been identified as a significant security concern, potentially exposing web servers to denial-of-service attacks.
The vulnerability, cataloged as CVE-2025-53506, affects multiple versions of the widely used Java servlet container and has been classified as having moderate severity by security researchers.
Vulnerability Details and Impact
The security flaw stems from an uncontrolled resource consumption issue within Apache Tomcat’s HTTP/2 implementation.
Specifically, the vulnerability occurs when an HTTP/2 client fails to acknowledge the initial settings frame that is designed to reduce the maximum permitted concurrent streams.
This oversight in the protocol handling creates an opportunity for malicious actors to exploit the system by overwhelming it with excessive HTTP/2 streams.
The affected versions span across three major release branches of Apache Tomcat.
Version 11.0.0-M1 through 11.0.8 in the newest branch, version 10.1.0-M1 through 10.1.42 in the stable branch, and version 9.0.0-M1 through 9.0.106 in the long-term support branch are all susceptible to this vulnerability.
The widespread nature of the affected versions means that a significant portion of production environments running Apache Tomcat could be at risk.
When exploited, this vulnerability can lead to resource exhaustion on the target server, effectively creating a denial-of-service condition.
Attackers can potentially consume server resources by creating numerous concurrent HTTP/2 streams without properly acknowledging the server’s stream limitations, causing legitimate users to experience service disruptions or complete unavailability.
Patches and Remediation
Apache developers have responded swiftly to address this security concern by releasing patched versions across all affected branches.
Users running Apache Tomcat 11.x should upgrade to version 11.0.9, while those using the 10.1.x branch should update to version 10.1.43. For the 9.0.x long-term support branch, the fix is available in version 9.0.107.
The patches implement proper handling of the HTTP/2 settings frame acknowledgment process, ensuring that concurrent stream limits are properly enforced even when clients fail to respond appropriately to initial settings.
This prevents the resource exhaustion scenario that made the denial-of-service attacks possible.
Security experts strongly recommend immediate patching for all affected installations, particularly those exposed to public internet traffic.
Organizations should also review their HTTP/2 configurations and consider implementing additional monitoring for unusual connection patterns that might indicate exploitation attempts.
Given the moderate severity rating and the potential for service disruption, this vulnerability represents a significant concern for enterprise environments relying on Apache Tomcat for web application deployment.





