Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.tomcat.embed/tomcat-embed-core
  4. ›
  5. CVE-2025-24813

CVE-2025-24813: Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT

March 10, 2025 (updated April 3, 2025)

Path Equivalence: ‘file.Name’ (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.

If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default)

  • support for partial PUT (enabled by default)
  • a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT

If all of the following were true, a malicious user was able to perform remote code execution:

  • writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat’s file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack

Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.

References

  • github.com/absholi7ly/POC-CVE-2025-24813/blob/main/README.md
  • github.com/advisories/GHSA-83qj-6fr2-vhqg
  • github.com/apache/tomcat
  • github.com/apache/tomcat/commit/0a668e0c27f2b7ca0cc7c6eea32253b9b5ecb29c
  • github.com/apache/tomcat/commit/eb61aade8f8daccaecabf07d428b877975622f72
  • github.com/apache/tomcat/commit/f6c01d6577cf9a1e06792be47e623d36acc3b5dc
  • lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq
  • lists.debian.org/debian-lts-announce/2025/04/msg00003.html
  • nvd.nist.gov/vuln/detail/CVE-2025-24813
  • security.netapp.com/advisory/ntap-20250321-0001
  • www.vicarius.io/vsociety/posts/cve-2025-24813-detect-apache-tomcat-rce
  • www.vicarius.io/vsociety/posts/cve-2025-24813-mitigate-apache-tomcat-rce

Code Behaviors & Features

Detect and mitigate CVE-2025-24813 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 9.0.0.M1 before 9.0.99, all versions starting from 10.1.0-M1 before 10.1.35, all versions starting from 11.0.0-M1 before 11.0.3

Fixed versions

  • 11.0.3
  • 10.1.35
  • 9.0.99

Solution

Upgrade to versions 10.1.35, 11.0.3, 9.0.99 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-44: Path Equivalence: 'file.name' (Internal Dot)
  • CWE-502: Deserialization of Untrusted Data

Source file

maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2025-24813.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:46 +0000.