CVE-2025-24813
Java vulnerability analysis and mitigation

Overview

CVE-2025-24813 is a critical vulnerability in Apache Tomcat discovered and disclosed on March 10, 2025. This vulnerability affects Apache Tomcat versions 11.0.0-M1 through 11.0.2, 10.1.0-M1 through 10.1.34, and 9.0.0.M1 through 9.0.98. The vulnerability is related to path equivalence in the 'file.Name' handling, which can lead to Remote Code Execution (RCE), information disclosure, and malicious content injection via the write-enabled Default Servlet (Apache Advisory, NVD).

Technical details

The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability stems from improper handling of uploaded session files and deserialization mechanisms. It specifically involves the partial PUT feature and can be triggered when specific conditions are met, including write-enabled default servlet and support for partial PUT (Rapid7 Blog, NetApp Advisory).

Impact

When successfully exploited, this vulnerability can lead to multiple severe impacts: remote code execution through deserialization attacks, unauthorized access to security-sensitive files, ability to inject malicious content into files, and potential information disclosure. The vulnerability's critical CVSS score of 9.8 reflects its potential for significant impact on affected systems (NVD, NetApp Advisory).

Mitigation and workarounds

Users are strongly recommended to upgrade to the fixed versions: Apache Tomcat 11.0.3, 10.1.35, or 9.0.99. For systems that cannot be immediately updated, key mitigations include ensuring the default servlet has writes disabled (which is the default setting) and disabling support for partial PUT if not required. Organizations should also monitor for unexpected PUT requests in web server logs and consider deploying WAF rules to block malicious payloads (Apache Advisory, Rapid7 Blog).

Community reactions

The security community has responded actively to this vulnerability, with multiple security firms and researchers providing analysis and detection tools. GreyNoise has created a dedicated tag to track exploitation attempts, while Rapid7 has noted that despite news headlines suggesting broad exploitation, the specific configuration requirements make widespread successful exploitation unlikely (GreyNoise Blog, Rapid7 Blog).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management