The New Zealand Computer Emergency Response Team (CERT NZ) recently issued an urgent security advisory regarding a critical vulnerability, CVE-2025-24813, affecting Apache Tomcat across multiple versions. This Apache Tomcat vulnerability, identified in March 2025, poses severe risks, including remote code execution (RCE), information disclosure, and content corruption.
The advisory outlines the threats and recommends necessary actions to mitigate the risks for users of the affected Apache Tomcat versions. CVE-2025-24813 is a critical vulnerability in Apache Tomcat that affects versions ranging from 9.0.0-M1 to 9.0.98, 10.1.0-M1 to 10.1.34, and 11.0.0-M1 to 11.0.2. It stems from an issue in how the partial PUT method is implemented in Tomcat.
In this scenario, an unauthenticated attacker could potentially upload a malicious serialized payload to a vulnerable server. If exploited, this flaw allows attackers to execute arbitrary code, control the server, or leak sensitive data, making it a significant risk for affected systems.
The flaw primarily impacts Apache Tomcat servers running specific versions, especially when certain conditions are met, as outlined by CERT NZ. This includes the existence of a proof of concept (PoC) and reports of active exploitation, raising the urgency for immediate remediation.
At the core of CVE-2025-24813 is the partial PUT method in Tomcat. When a file is uploaded via a partial PUT request, it generates a temporary file on the server based on the provided filename. The vulnerability is triggered when the file’s path separator is replaced by a period (“.”), which can lead to unintended file manipulations. This behavior opens the door to two main exploit scenarios:
Systems using any of the following Apache Tomcat versions are at risk from CVE-2025-24813:
Administrators should check their Apache Tomcat installation to see if they are running any of these versions and review their configuration to assess the vulnerability’s exposure.
If your system runs an affected version of Apache Tomcat, it’s crucial to verify whether additional conditions specified by the advisory are also present. Follow these steps:
To mitigate the risks associated with CVE-2025-24813, administrators should immediately:
These updated versions eliminate the vulnerability by properly securing the partial PUT functionality, closing the exploit vector and preventing the possibility of remote code execution.
The CVE-2025-24813 vulnerability is just the latest in a series of critical security flaws identified in Apache Tomcat. The Tomcat team has worked diligently to address previous issues like CVE-2024-50379, CVE-2023-42795, and CVE-2024-34750. These vulnerabilities were severe, with potential impacts ranging from remote code execution to privilege escalation and data exposure.
This flaw was identified in Apache Tomcat’s handling of session persistence. It could have allowed attackers to gain unauthorized access to session data, potentially compromising sensitive information stored in sessions. Prompt patches were made available to address the issue, and administrators were advised to upgrade as soon as possible.
CVE-2023-42795 was another critical vulnerability that affected Apache Tomcat. It allowed attackers to bypass security restrictions, which could have led to unauthorized access to sensitive data stored within the application. Users were urged to upgrade to newer, more secure versions of Apache Tomcat to mitigate the risk.
CVE-2024-34750 was a vulnerability that exposed internal resources to external requests. Exploiting this flaw, an attacker could potentially escalate privileges and execute unauthorized actions within the system. Apache Tomcat issued patches that resolved the flaw, mitigating the risk for users of affected versions.
Apache Tomcat has released security patches to mitigate risks such as remote code execution, denial of service, privilege escalation, and information leakage. While it remains a widely used platform, the Apache Tomcat vulnerability highlight the critical need for administrators to stay up to date with security practices, patch management, and system hardening.
By adhering to CERT NZ’s advisory, applying necessary updates, and maintaining strong security measures, organizations can protect their systems from cyber threats, protect sensitive data, and avoid security breaches.
Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.