
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2025-24813 is a critical vulnerability in Apache Tomcat discovered and disclosed on March 10, 2025. This vulnerability affects Apache Tomcat versions 11.0.0-M1 through 11.0.2, 10.1.0-M1 through 10.1.34, and 9.0.0.M1 through 9.0.98. The vulnerability is related to path equivalence in the 'file.Name' handling, which can lead to Remote Code Execution (RCE), information disclosure, and malicious content injection via the write-enabled Default Servlet (Apache Advisory, NVD).
The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The vulnerability stems from improper handling of uploaded session files and deserialization mechanisms. It specifically involves the partial PUT feature and can be triggered when specific conditions are met, including write-enabled default servlet and support for partial PUT (Rapid7 Blog, NetApp Advisory).
When successfully exploited, this vulnerability can lead to multiple severe impacts: remote code execution through deserialization attacks, unauthorized access to security-sensitive files, ability to inject malicious content into files, and potential information disclosure. The vulnerability's critical CVSS score of 9.8 reflects its potential for significant impact on affected systems (NVD, NetApp Advisory).
Users are strongly recommended to upgrade to the fixed versions: Apache Tomcat 11.0.3, 10.1.35, or 9.0.99. For systems that cannot be immediately updated, key mitigations include ensuring the default servlet has writes disabled (which is the default setting) and disabling support for partial PUT if not required. Organizations should also monitor for unexpected PUT requests in web server logs and consider deploying WAF rules to block malicious payloads (Apache Advisory, Rapid7 Blog).
The security community has responded actively to this vulnerability, with multiple security firms and researchers providing analysis and detection tools. GreyNoise has created a dedicated tag to track exploitation attempts, while Rapid7 has noted that despite news headlines suggesting broad exploitation, the specific configuration requirements make widespread successful exploitation unlikely (GreyNoise Blog, Rapid7 Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”