Exploitation of Apache Tomcat Vulnerability CVE-2025-24813
Exploitation of CVE-2025-24813 could allow an attacker to achieve RCE, view security sensitive files, or inject content
Summary
Exploitation of CVE-2025-24813 could allow an attacker to achieve RCE, view security sensitive files, or inject content
Affected platforms
The following platforms are known to be affected:
Threat details
Exploitation of CVE-2025-24813
A public proof-of-concept exploit is available for CVE-2025-24813 and exploitation has been reported in the wild. The NHS England National CSOC assesses that continued exploitation of this vulnerability is considered highly likely.
Introduction
The Apache Software Foundation has released security updates addressing a vulnerability in Apache Tomcat. Tomcat is an open-source web server and servlet container that is used to deploy and serve Java-based web applications.
CVE-2025-24813 is 'deserialisation of untrusted data' and 'path equivalence: file.name (Internal dot)' vulnerability that an attacker could exploit to achieve remote code execution (RCE), view security sensitive files, or inject content into those files.
Exploitation of this vulnerability has been reported in the wild and a public proof-of-concept exploit has been released. The NHS England National CSOC assesses that continued exploitation of this vulnerability is considered highly likely.
Conditions required for exploitation
To achieve RCE, the following conditions must be true:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default) must be present
- application is using Tomcat's file based session persistence with the default storage location
- application included a library that may be leveraged in a deserialisation attack
Alternatively, to view sensitive files or inject content into those files, the following prerequisite conditions must be met:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default) must be present
- a target URL for security sensitive uploads that is a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT
Remediation advice
Affected organisations are encouraged to review the following advisories and apply the relevant updates as soon as practicable.
Remediation steps
Type | Step |
---|---|
Guidance |
Update to Apache Tomcat 11.0.3 or later https://tomcat.apache.org/security-11.html |
Guidance |
Update to Apache Tomcat 10.1.35 or later https://tomcat.apache.org/security-10.html |
Guidance |
Update to Apache Tomcat 9.0.99 or later https://tomcat.apache.org/security-9.html |
Definitive source of threat updates
Last edited: 17 March 2025 4:13 pm