A serious vulnerability, identified as CVE-2025-24813, has been disclosed in Apache Tomcat, a widely used web server software. This unauthenticated remote code execution (RCE) flaw within Tomcat’s partial PUT feature could, under specific circumstances, allow attackers to execute code remotely on target systems. While initial reports suggested broad exploitation, further analysis indicates that successful exploitation requires specific, non-default, and uncommon configurations. However, with public proof-of-concept (PoC) exploit code now available, it’s crucial for organisations using affected versions to understand the risk and take appropriate action.
CVE-2025-24813 is an unauthenticated Remote Code Execution (RCE) vulnerability that stems from how Apache Tomcat handles PUT and GET requests in conjunction with its partial PUT feature. The vulnerability, which carries a CVSS score of 5.5 according to SOCRadar and a CRITICAL base score of 9.8 according to NIST, could also lead to information disclosure and/or the addition of malicious content to uploaded files.
The root cause lies in a path equivalence issue (‘file.Name’ – Internal Dot) within the write-enabled Default Servlet. This can be leveraged in combination with partial PUT support
According to researchers at Wallarm, the attack sequence involves a two-step process:
It’s worth noting that many Web Application Firewalls (WAFs) may struggle to detect this exploitation due to the legitimate nature of PUT requests, the obfuscation of the payload through base64 encoding,and the multi-step execution process
The sources highlight specific conditions that must be met for successful exploitation.
For Viewing/Injecting Content into Security Sensitive Files
Rapid7’s analysis suggests that the exploitable configuration for RCE is relatively uncommon, with a GitHub code search finding only a small number of open-source Tomcat projects publicly using write-enabled default servlet configurations
While news headlines have alleged broad exploitation, Rapid7 has been unable to confirm any successful exploitation against real-world production environments. SOCRadar reported the first known attack in Poland on March 12, even before a public PoC was available. Public PoC exploits have since surfaced on GitHub.
Red Hat has rated this vulnerability as high severity with a score of 8.6. Successful exploitation could allow attackers to:
Researchers caution that this could be the initial phase of attacks, with future exploits potentially focusing on uploading rogue JSP files and establishing persistent access
The recommended course of action is to upgrade to the following fixed versions as soon as possible:
Organisations should review their Tomcat configurations to determine their specific risk, even if they intend to upgrade. Pay close attention to whether the default servlet has write access enabled and if file-based session persistence is in use with the default storage location.
While the conditions for successful exploitation of CVE-2025-24813 appear to be specific and not enabled by default, the availability of public PoC code and reports of in-the-wild attempts underscore the importance of taking this vulnerability seriously. Upgrading to the latest fixed versions of Apache Tomcat is the most effective way to mitigate this risk. Organisations should also review their configurations to understand their potential exposure and implement broader security best practices.
Critical Security Flaws Uncovered in Ingress NGINX Controller: Act Now to Protect Your Kubernetes Clusters.…
Introduction In a shocking revelation, it has been disclosed that the infrastructure used to maintain…
Introduction: In the early hours of January 5, the cryptocurrency community was abuzz with speculation…
Summary: A newly identified technique called SMTP smuggling poses a significant threat to email security…
Since 2019, the Operation Triangulation spyware has targeted iPhone devices, exploiting undocumented features within Apple…
The Challenge: CVE-2023-38545 In the world of digital security, a formidable adversary has emerged -…
This website uses cookies.