CVE-2025-24813

Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT

Basic Information

CVE State
PUBLISHED
Reserved Date
January 24, 2025
Published Date
March 10, 2025
Last Updated
April 02, 2025
Vendor
Apache Software Foundation
Product
Apache Tomcat
Description
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.

CVSS Scores

EPSS Score

Score
92.96% (Percentile: 99.76%) as of 2025-04-29

SSVC Information

Exploitation
active
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2025-04-01 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2025-04-27 13:50:24 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2025-04-01 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

tomcat_partial_put_deserialization

Type: metasploit • Created: Unknown

Metasploit module for CVE-2025-24813

hakankarabacak/CVE-2025-24813

Type: github • Created: 2025-04-27 13:50:24 UTC • Stars: 0

Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat.

Erosion2020/CVE-2025-24813-vulhub

Type: github • Created: 2025-04-18 11:03:33 UTC • Stars: 2

CVE-2025-24813的vulhub环境的POC脚本

Mattb709/CVE-2025-24813-Scanner

Type: github • Created: 2025-04-12 19:12:39 UTC • Stars: 1

CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation.

Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE

Type: github • Created: 2025-04-12 17:38:02 UTC • Stars: 1

A Python proof-of-concept exploit for CVE-2025-24813 - Unauthenticated RCE in Apache Tomcat (v9.0.0-9.0.98/10.1.0-10.1.34/11.0.0-11.0.2) via malicious Java object deserialization. Includes safe detection mode and custom payload support.

Franconyu/Poc_for_CVE-2025-24813

Type: github • Created: 2025-04-10 14:49:14 UTC • Stars: 7

CVE-2025-24813 poc

f8l124/CVE-2025-24813-POC

Type: github • Created: 2025-04-09 15:20:32 UTC • Stars: 0

A simple, easy-to-use POC for CVE-2025-42813 (Apache Tomcat versions below 9.0.99).

GadaLuBau1337/CVE-2025-24813

Type: github • Created: 2025-04-08 14:52:37 UTC • Stars: 0

horsehacks/CVE-2025-24813-checker

Type: github • Created: 2025-04-07 22:43:56 UTC • Stars: 0

Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker.

Heimd411/CVE-2025-24813-noPoC

Type: github • Created: 2025-04-07 16:17:06 UTC • Stars: 0

La3B0z/CVE-2025-24813-POC

Type: github • Created: 2025-04-06 19:36:48 UTC • Stars: 0

CVE-2025-24813-POC JSP Web Shell Uploader

MuhammadWaseem29/CVE-2025-24813

Type: github • Created: 2025-04-05 18:57:08 UTC • Stars: 30

AsaL1n/CVE-2025-24813

Type: github • Created: 2025-04-05 09:07:13 UTC • Stars: 3

simple exp for CVE-2025-24813

B1gN0Se/Tomcat-CVE-2025-24813

Type: github • Created: 2025-03-31 19:01:28 UTC • Stars: 0

manjula-aw/CVE-2025-24813

Type: github • Created: 2025-03-30 09:39:45 UTC • Stars: 0

This repository contains a shell script based POC on Apache Tomcat CVE-2025-24813. It allow you to easily test the vulnerability on any version of Apache Tomcat

AlperenY-cs/CVE-2025-24813

Type: github • Created: 2025-03-28 09:44:28 UTC • Stars: 1

Create lab for CVE-2025-24813

beyond-devsecops/CVE-2025-24813

Type: github • Created: 2025-03-24 17:47:10 UTC • Stars: 2

Session Exploit

tonyarris/CVE-2025-24813-PoC

Type: github • Created: 2025-03-22 15:16:41 UTC • Stars: 1

A PoC for CVE-2025-24813

Alaatk/CVE-2025-24813-POC

Type: github • Created: 2025-03-21 18:05:27 UTC • Stars: 1

CVE-2025-24813 Apache Tomcat RCE Proof of Concept (PoC)

n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813

Type: github • Created: 2025-03-20 22:52:00 UTC • Stars: 0

POC for CVE-2025-24813 using Spring-Boot

michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813

Type: github • Created: 2025-03-19 14:32:01 UTC • Stars: 0

Apache Tomcat Vulnerability POC (CVE-2025-24813)

msadeghkarimi/CVE-2025-24813-Exploit

Type: github • Created: 2025-03-18 08:42:12 UTC • Stars: 5

Apache Tomcat Remote Code Execution (RCE) Exploit - CVE-2025-24813

imbas007/CVE-2025-24813-apache-tomcat

Type: github • Created: 2025-03-17 22:39:38 UTC • Stars: 2

Nuclei Template CVE-2025–24813

issamjr/CVE-2025-24813-Scanner

Type: github • Created: 2025-03-17 03:58:34 UTC • Stars: 2

CVE-2025-24813 - Apache Tomcat Vulnerability Scanner

charis3306/CVE-2025-24813

Type: github • Created: 2025-03-16 11:59:59 UTC • Stars: 10

CVE-2025-24813利用工具

absholi7ly/POC-CVE-2025-24813

Type: github • Created: 2025-03-14 07:36:58 UTC • Stars: 110

his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.

gregk4sec/CVE-2025-24813

Type: github • Created: 2025-03-14 05:39:33 UTC • Stars: 1

Security Researcher

N0c1or/CVE-2025-24813_POC

Type: github • Created: 2025-03-14 03:11:40 UTC • Stars: 3

CVE-2025-24813_POC

iSee857/CVE-2025-24813-PoC

Type: github • Created: 2025-03-13 10:00:03 UTC • Stars: 82

Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)