Improper access control in Apache Tomcat - CVE-2026-43515
Published: May 12, 2026
Apache Tomcat
Detailed vulnerability description
The vulnerability allows a remote attacker to bypass security constraints.
The vulnerability exists due to improper access control in HTTP method constraint processing when evaluating multiple security constraints for the same extension pattern. A remote attacker can send a request using an improperly constrained HTTP method to bypass security constraints.