CVE-2025-24813: Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT
(updated )
Path Equivalence: ‘file.Name’ (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.
If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT
If all of the following were true, a malicious user was able to perform remote code execution:
- writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat’s file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack
Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.98, which fixes the issue.
References
- github.com/absholi7ly/POC-CVE-2025-24813/blob/main/README.md
- github.com/advisories/GHSA-83qj-6fr2-vhqg
- github.com/apache/tomcat
- github.com/apache/tomcat/commit/0a668e0c27f2b7ca0cc7c6eea32253b9b5ecb29c
- github.com/apache/tomcat/commit/eb61aade8f8daccaecabf07d428b877975622f72
- github.com/apache/tomcat/commit/f6c01d6577cf9a1e06792be47e623d36acc3b5dc
- lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq
- nvd.nist.gov/vuln/detail/CVE-2025-24813
- www.vicarius.io/vsociety/posts/cve-2025-24813-detect-apache-tomcat-rce
- www.vicarius.io/vsociety/posts/cve-2025-24813-mitigate-apache-tomcat-rce
Detect and mitigate CVE-2025-24813 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →