nomisec
WORKING POC
184 stars
by absholi7ly · remote
https://github.com/absholi7ly/POC-CVE-2025-24813
This PoC exploits CVE-2025-24813, a deserialization vulnerability in Apache Tomcat, by uploading a malicious payload via PUT requests and triggering deserialization through session manipulation. It supports both ysoserial and custom Java payloads for RCE.
Classification
Working Poc 95%
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Target must allow PUT requests · ysoserial.jar for ysoserial payload generation · Java compiler for custom payload generation
nomisec
WORKING POC
95 stars
by iSee857 · remote
https://github.com/iSee857/CVE-2025-24813-PoC
This repository contains a Python-based proof-of-concept exploit for CVE-2025-24813, targeting Apache Tomcat for remote code execution. The script checks for vulnerability by sending a crafted payload and verifying the response.
Classification
Working Poc 90%
Target:
Apache Tomcat
No auth needed
Prerequisites:
Network access to the target Tomcat server
nomisec
WORKING POC
19 stars
by mbanyamer · remote
https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-
This exploit leverages unsafe deserialization in Apache Tomcat to achieve RCE by uploading a malicious serialized payload to a writable session directory and triggering deserialization via a JSP request. It uses ysoserial to generate the payload and requires PUT method support on the target.
Classification
Working Poc 95%
Target:
Apache Tomcat 9.x, 10.x
No auth needed
Prerequisites:
Target must allow PUT requests · ysoserial.jar for payload generation · Writable session directory
nomisec
WORKING POC
17 stars
by drcrypterdotru · remote
https://github.com/drcrypterdotru/Apache-GOExploiter
This Go-based exploit targets CVE-2025-24813 by uploading a malicious JSP shell to vulnerable Apache Tomcat servers via HTTP PUT requests. It includes functionality to detect open ports, exploit the vulnerability, and log successful compromises.
Classification
Working Poc 90%
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Target server with exposed Tomcat manager or misconfigured PUT method · Network access to port 8080
nomisec
WORKING POC
16 stars
by charis3306 · remote
https://github.com/charis3306/CVE-2025-24813
This repository contains a proof-of-concept exploit for CVE-2025-24813, targeting Apache Tomcat versions 9.0.0.M1 to 9.0.98, 10.1.0-M1 to 10.1.34, and 11.0.0-M1 to 11.0.2. The exploit leverages deserialization via session persistence and Partial PUT requests to achieve remote code execution.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Apache Tomcat
No auth needed
Prerequisites:
DefaultServlet write functionality enabled · Partial PUT requests supported · File session persistence enabled · Vulnerable deserialization library in classpath
nomisec
WORKING POC
11 stars
by qzy0x · poc
https://github.com/qzy0x/cve-2025-24813_poc
This PoC exploits a deserialization vulnerability in Apache Tomcat (CVE-2025-24813) by sending a crafted base64-encoded payload to trigger unsafe deserialization. It checks for vulnerability by observing a 500 error response after setting a specific session cookie.
Classification
Working Poc 90%
Attack Type
Deserialization
Target:
Apache Tomcat (9.0.0.M1 <= 9.0.98, 10.1.0-M1 <= 10.1.34, 11.0.0-M1 <= 11.0.2)
No auth needed
Prerequisites:
Network access to the target Tomcat instance · Tomcat version within the affected range
nomisec
WORKING POC
8 stars
by Franconyu · remote
https://github.com/Franconyu/Poc_for_CVE-2025-24813
This repository contains a Python-based PoC for CVE-2025-24813, a deserialization vulnerability in Apache Tomcat. It includes version detection, payload generation using ysoserial, and exploitation via HTTP PUT/GET requests.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Apache Tomcat 9.0.0.M1-9.0.98, 10.1.0-M1-10.1.34, 11.0.0-M1-11.0.2
No auth needed
Prerequisites:
ysoserial-all.jar in the same directory · network access to target Tomcat instance
nomisec
SCANNER
7 stars
by x00byte · poc
https://github.com/x00byte/PutScanner
This repository contains a Python-based scanner designed to detect writable web directories via HTTP PUT method, specifically targeting CVE-2025-24813 (Arbitrary File Upload in Apache Tomcat). The tool performs two-stage verification (PUT + GET) to confirm writable directories and includes features like protocol auto-detection and verbose output.
Classification
Scanner 95%
Target:
Apache Tomcat (versions affected by CVE-2025-24813)
No auth needed
Prerequisites:
Network access to the target web server · HTTP PUT method enabled on the server
nomisec
WORKING POC
6 stars
by u238 · remote
https://github.com/u238/Tomcat-CVE_2025_24813
This PoC exploits a deserialization vulnerability in Apache Tomcat (CVE-2025-24813) by uploading a malicious serialized payload via PUT requests and triggering deserialization through session manipulation. It includes payload generation using ysoserial or custom Java code for RCE.
Classification
Working Poc 90%
Attack Type
Deserialization
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Target server with writable directories via PUT · Java runtime for payload generation · ysoserial.jar for advanced payloads
nomisec
WORKING POC
5 stars
by Erosion2020 · remote
https://github.com/Erosion2020/CVE-2025-24813-vulhub
This PoC exploits CVE-2025-24813, a deserialization vulnerability in Apache Tomcat. It sends a base64-encoded serialized payload via a PUT request and triggers deserialization via a GET request with a crafted session cookie.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Apache Tomcat (specific version not specified)
No auth needed
Prerequisites:
Base64-encoded serialized payload · Target host and port · Vulnerable Tomcat instance
nomisec
SCANNER
5 stars
by msadeghkarimi · remote
https://github.com/msadeghkarimi/CVE-2025-24813-Exploit
This repository contains a scanner for detecting Apache Tomcat servers vulnerable to CVE-2025-24813. The tool sends a crafted request to check for vulnerability but does not include a full exploit payload for RCE.
Classification
Scanner 90%
Target:
Apache Tomcat
No auth needed
Prerequisites:
Network access to the target Tomcat server
nomisec
SCANNER
5 stars
by Mattb709 · remote
https://github.com/Mattb709/CVE-2025-24813-Scanner
This repository contains a multi-threaded scanner for detecting Apache Tomcat servers vulnerable to CVE-2025-24813, which involves arbitrary file upload leading to RCE. The scanner checks for vulnerability by attempting to upload a serialized Java object via HTTP PUT and verifying execution via jsessionid parameter.
Classification
Scanner 95%
Target:
Apache Tomcat
No auth needed
Prerequisites:
Network access to target Apache Tomcat servers · CSV file with target host, IP, and port information
nomisec
SCANNER
4 stars
by cchopin · poc
https://github.com/cchopin/CVE-Arsenal-Lab
The repository contains a scanner and a detection script for CVE-2025-24813, which checks for Apache Tomcat configurations with 'readonly=false' in web.xml files. The tools are designed to identify vulnerable configurations but do not include exploit code.
Classification
Scanner 95%
Target:
Apache Tomcat
No auth needed
Prerequisites:
Access to the target system or network
nomisec
WORKING POC
4 stars
by Mattb709 · remote
https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE
This is a functional PoC for CVE-2025-24813, an Apache Tomcat deserialization vulnerability. It allows testing for RCE by sending a serialized payload via session file upload and triggering deserialization through a crafted request.
Classification
Working Poc 95%
Target:
Apache Tomcat (version not specified in PoC)
No auth needed
Prerequisites:
Network access to vulnerable Tomcat instance · Session persistence enabled · Deserialization gadgets in classpath
nomisec
WORKING POC
4 stars
by Shivshantp · poc
https://github.com/Shivshantp/CVE-2025-24813
This repository contains a functional PoC for CVE-2025-24813, demonstrating RCE in Apache Tomcat via HTTP PUT method to upload a malicious JSP web shell. The exploit includes a Python script to upload the shell and execute commands.
Classification
Working Poc 100%
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Target Apache Tomcat instance with PUT method enabled · Network access to the target
nomisec
WORKING POC
4 stars
by AsaL1n · remote
https://github.com/AsaL1n/CVE-2025-24813
The PoC exploits CVE-2025-24813 by sending a crafted PUT request with a base64-decoded payload and a specific Content-Range header, followed by a GET request to trigger deserialization. The example uses a DNS-based payload (urldns) for out-of-band detection.
Classification
Working Poc 90%
Attack Type
Deserialization
Target:
Unknown (likely a Java-based web application)
No auth needed
Prerequisites:
Target URL · Base64-encoded serialized payload
nomisec
WRITEUP
3 stars
by AlperenY-cs · poc
https://github.com/AlperenY-cs/CVE-2025-24813
This repository provides a guide and testing environment for CVE-2025-24813, an unauthenticated RCE vulnerability in Apache Tomcat. It includes steps to set up a vulnerable Docker container and test file upload functionality.
Classification
Writeup 90%
Target:
Apache Tomcat 11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, 9.0.0.M1 to 9.0.98
No auth needed
Prerequisites:
Docker environment · Access to vulnerable Apache Tomcat instance
nomisec
SCANNER
3 stars
by imbas007 · poc
https://github.com/imbas007/CVE-2025-24813-apache-tomcat
This repository provides a Nuclei template for detecting CVE-2025-24813, an Apache Tomcat vulnerability. It includes a basic command execution example but lacks a full exploit implementation.
Classification
Scanner 80%
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Nuclei installed · Target URL list
nomisec
WORKING POC
3 stars
by N0c1or · remote
https://github.com/N0c1or/CVE-2025-24813_POC
This PoC exploits a deserialization vulnerability in a Java-based application, likely targeting a web server. The payload is a serialized Java object that, when deserialized, executes arbitrary code.
Classification
Working Poc 90%
Attack Type
Deserialization
Target:
Unknown Java-based application (likely a web server)
No auth needed
Prerequisites:
Target application must be running and accessible · Vulnerable deserialization endpoint must be exposed
nomisec
WORKING POC
3 stars
by Alaatk · remote
https://github.com/Alaatk/CVE-2025-24813-POC
This PoC exploits CVE-2025-24813, a deserialization vulnerability in Apache Tomcat, by uploading a malicious serialized payload via a PUT request and triggering its execution through session persistence. The payload is a base64-encoded ysoserial-generated gadget chain that executes arbitrary commands (e.g., creating a file in /tmp).
Classification
Working Poc 95%
Target:
Apache Tomcat (version not specified, but requires specific misconfigurations)
No auth needed
Prerequisites:
PUT/write access enabled in Tomcat's web.xml (readonly=false) · Session persistence enabled via PersistentManager in context.xml · CommonsBeanutils and CommonsCollections libraries in Tomcat's lib directory
nomisec
WORKING POC
3 stars
by beyond-devsecops · remote
https://github.com/beyond-devsecops/CVE-2025-24813
This repository contains a functional proof-of-concept exploit for CVE-2025-24813, demonstrating remote code execution via unsafe Java deserialization in a Tomcat-hosted application. The exploit uses ysoserial to generate a reverse shell payload, uploads it via HTTP Partial PUT, and triggers deserialization to achieve RCE.
Classification
Working Poc 95%
Target:
Apache Tomcat 9.x with vulnerable Java application
No auth needed
Prerequisites:
Java JDK 11+ · Docker · Netcat · ysoserial.jar · Network access to target Tomcat instance
nomisec
WORKING POC
2 stars
by pirenga · poc
https://github.com/pirenga/CVE-2025-24813
This PoC demonstrates a deserialization vulnerability in Tomcat 10 / Jakarta EE via a malicious servlet that writes to a file upon deserialization. The exploit includes a serializer to generate the payload and a servlet to trigger the vulnerability.
Classification
Working Poc 90%
Attack Type
Deserialization
Target:
Apache Tomcat 10 / Jakarta EE
No auth needed
Prerequisites:
Access to a vulnerable Tomcat/Jakarta EE server · Ability to send serialized objects to the server
nomisec
WORKING POC
1 stars
by gregk4sec · remote
https://github.com/gregk4sec/CVE-2025-24813
The repository contains a functional exploit PoC for CVE-2025-24813, demonstrating how path equivalence in Apache Tomcat's Default Servlet can lead to information disclosure via partial PUT requests. The script automates the attack by manipulating temp file mappings to leak sensitive data.
Classification
Working Poc 95%
Target:
Apache Tomcat (versions with Default Servlet vulnerable to path equivalence)
No auth needed
Prerequisites:
PUT method enabled · Partial PUT support (allowPartialPut=true) · Writable directory structure
nomisec
WORKING POC
1 stars
by La3B0z · poc
https://github.com/La3B0z/CVE-2025-24813-POC
This repository contains a working PoC for CVE-2025-24813, which exploits a path traversal vulnerability in Apache Tomcat to upload a JSP web shell. The exploit includes a scanner to identify vulnerable targets and an exploit script to verify command execution.
Classification
Working Poc 95%
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Apache Tomcat · HTTP PUT method must be enabled on the target
nomisec
WORKING POC
1 stars
by tonyarris · remote
https://github.com/tonyarris/CVE-2025-24813-PoC
This PoC exploits CVE-2025-24813 in Apache Tomcat by uploading a malicious serialized payload via a PUT request and triggering deserialization with a GET request. It generates multiple ysoserial gadget payloads to achieve RCE.
Classification
Working Poc 95%
Target:
Apache Tomcat (misconfigured and vulnerable version)
No auth needed
Prerequisites:
Vulnerable Apache Tomcat version · Misconfigured Tomcat instance · ysoserial-all.jar in the same directory
nomisec
WORKING POC
1 stars
by manjula-aw · remote
https://github.com/manjula-aw/CVE-2025-24813
This PoC demonstrates a deserialization vulnerability in Apache Tomcat (CVE-2025-24813) by using ysoserial to generate a malicious payload and exploiting a misconfigured session persistence mechanism. The exploit achieves remote code execution by leveraging CommonsCollections5 gadget chains.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Apache Tomcat (versions requiring testing, e.g., 10.1.15)
No auth needed
Prerequisites:
Apache Tomcat with misconfigured session persistence · Commons Collections library in classpath · Network access to Tomcat server
nomisec
WORKING POC
1 stars
by MuhammadWaseem29 · remote
https://github.com/MuhammadWaseem29/CVE-2025-24813
This PoC demonstrates a path traversal vulnerability in Apache Tomcat (CVE-2025-24813) by uploading a malicious JSP file via a PUT request, enabling remote code execution (RCE) through command injection.
Classification
Working Poc 95%
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Target server running vulnerable Apache Tomcat · Network access to the target
nomisec
WORKING POC
1 stars
by GadaLuBau1337 · remote
https://github.com/GadaLuBau1337/CVE-2025-24813
This repository contains a functional PoC for CVE-2025-24813, a deserialization-based RCE vulnerability in Apache Tomcat. The exploit uploads a malicious serialized payload to a writable directory and triggers deserialization via a GET request.
Classification
Working Poc 90%
Target:
Apache Tomcat (theoretical vulnerable version)
No auth needed
Prerequisites:
Vulnerable Apache Tomcat version · Writable directory via PUT requests · Deserialization trigger mechanism
nomisec
WORKING POC
1 stars
by fatkz · remote
https://github.com/fatkz/CVE-2025-24813
This PoC exploits CVE-2025-24813 in Apache Tomcat by uploading a malicious serialized session file via a partial PUT request and triggering deserialization to achieve remote code execution.
Classification
Working Poc 95%
Target:
Apache Tomcat 9.0.80–9.0.83, 10.1.0–10.1.17
No auth needed
Prerequisites:
DefaultServlet with readonly=false · PersistentManager and FileStore configured · ysoserial or similar tool for payload generation
nomisec
WORKING POC
1 stars
by cyglegit · remote
https://github.com/cyglegit/CVE-2025-24813
This repository contains a Python-based exploit toolkit for CVE-2025-24813, targeting Apache Tomcat servers vulnerable to insecure session deserialization. It automates gadget chain testing and includes multi-target scanning capabilities.
Classification
Working Poc 95%
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Python 3.6+ · Java Runtime · ysoserial.jar
nomisec
WORKING POC
1 stars
by seahcy · remote
https://github.com/seahcy/CVE-2025-24813
This repository provides a functional exploit for CVE-2025-24813, targeting Apache Tomcat 9.0.90 with Java deserialization via CommonsCollections6. The exploit leverages ysoserial to generate a payload and uploads it to a vulnerable Tomcat instance, achieving remote code execution.
Classification
Working Poc 95%
Target:
Apache Tomcat 9.0.90 with commons-collections-3.2.1.jar
No auth needed
Prerequisites:
Tomcat 9.0.90 with commons-collections-3.2.1.jar · Java 25.0.1 · ysoserial-all.jar
nomisec
WORKING POC
1 stars
by ftz7 · poc
https://github.com/ftz7/PoC-CVE-2025-24813
This repository contains a functional exploit for CVE-2025-24813, targeting Apache Tomcat via Java deserialization and HTTP PUT method abuse to achieve remote code execution (RCE). The exploit automates session ID retrieval, payload generation (using ysoserial or custom Java), and payload delivery to trigger command execution.
Classification
Working Poc 95%
Target:
Apache Tomcat 11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, 9.0.0.M1 to 9.0.98
No auth needed
Prerequisites:
Python 3.x · Java JDK · ysoserial.jar · requests library · network access to target Tomcat server
nomisec
SCANNER
by michael-david-fry · poc
https://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813
This script performs non-intrusive checks for CVE-2025-24813 by extracting Tomcat version from HTTP headers, testing for write-enabled DefaultServlet via HTTP PUT/DELETE, and retrieving session IDs. It logs results to a report file and console.
Classification
Scanner 90%
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Network access to target Tomcat server · CSV file with target hostnames and IPs
nomisec
WRITEUP
by Heimd411 · poc
https://github.com/Heimd411/CVE-2025-24813-noPoC
This repository documents failed attempts to exploit CVE-2025-24813, a deserialization vulnerability in Apache Tomcat. The author reports that payload chains tested against versions 9.0.90 and 10.1.15 did not succeed due to module access restrictions.
Classification
Writeup 100%
Attack Type
Deserialization
Target:
Apache Tomcat 9.0.90, 10.1.15
No auth needed
Prerequisites:
Access to upload deserialized payloads to Tomcat
github
WORKING POC
by manus-use · postscriptpoc
https://github.com/manus-use/cve-pocs/tree/main/Tomcat-CVE-2025-24813
The repository contains a functional exploit for CVE-2025-24813, targeting Apache Tomcat. The exploit includes a Python script that demonstrates remote code execution (RCE) by uploading a web shell to a vulnerable Tomcat server. The repository also includes Dockerfiles for setting up a vulnerable environment and a script to automate the attack.
Classification
Working Poc 95%
Target:
Apache Tomcat
No auth needed
Prerequisites:
Docker · curl · Apache Tomcat server
nomisec
WORKING POC
by yaleman · poc
https://github.com/yaleman/cve-2025-24813-poc
This repository contains a functional proof-of-concept exploit for CVE-2025-24813, a Java deserialization vulnerability in Apache Tomcat. The exploit leverages ysoserial to generate malicious payloads and uploads them via PUT requests to achieve remote code execution.
Classification
Working Poc 95%
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Docker (for recommended setup) · Java runtime environment · ysoserial.jar · Python dependencies
nomisec
WORKING POC
by threadpoolx · poc
https://github.com/threadpoolx/CVE-2025-24813-Remote-Code-Execution-in-Apache-Tomcat
This repository contains a working PoC for CVE-2025-24813, a path equivalence vulnerability in Apache Tomcat that allows security constraint bypass and RCE via inconsistent URL parsing of semicolons.
Classification
Working Poc 90%
Target:
Apache Tomcat (non-default configurations)
No auth needed
Prerequisites:
File upload functionality to upload a JSP shell · Knowledge of a valid executable endpoint
nomisec
WORKING POC
by GongWook · poc
https://github.com/GongWook/CVE-2025-24813
This PoC exploits a deserialization vulnerability in Apache Tomcat (CVE-2025-24813) by uploading a malicious session file via PUT and triggering deserialization with a crafted JSESSIONID cookie. It uses ysoserial to generate a payload for remote command execution (RCE).
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Java 8 installed or automatically downloaded · ysoserial.jar downloaded or available · Network access to target Tomcat server
nomisec
WORKING POC
by Makavellik · poc
https://github.com/Makavellik/POC-CVE-2025-24813-Apache-Tomcat-Remote-Code-Execution
This repository contains a Python-based exploit for CVE-2025-24813, targeting Apache Tomcat for remote code execution. The script includes advanced features like stealth headers, retry logic, and logging, suggesting a functional PoC.
Classification
Working Poc 85%
Target:
Apache Tomcat (version not explicitly specified)
No auth needed
Prerequisites:
Network access to vulnerable Apache Tomcat instance · Python environment with required libraries
nomisec
WORKING POC
by hakankarabacak · remote
https://github.com/hakankarabacak/CVE-2025-24813
This is a functional PoC for CVE-2025-24813, exploiting a deserialization vulnerability in Apache Tomcat via session file upload and manipulation. It uses ysoserial to generate payloads and triggers RCE through a crafted JSESSIONID.
Classification
Working Poc 95%
Target:
Apache Tomcat (likely 9.0.90 or similar)
No auth needed
Prerequisites:
ysoserial.jar · network access to target Tomcat server · Tomcat configured to save sessions to disk
nomisec
WORKING POC
by f8l124 · poc
https://github.com/f8l124/CVE-2025-24813-POC
This repository contains a standalone PoC for CVE-2025-24813, demonstrating a remote file upload vulnerability in Apache Tomcat 9.0.55 via partial PUT requests. It includes a Python script to detect, exploit, and verify the vulnerability by uploading a benign JSP file.
Classification
Working Poc 95%
Target:
Apache Tomcat 9.0.55
No auth needed
Prerequisites:
Python 3.7+ · Optional: html2image for screenshot capture
nomisec
SCANNER
by horsehacks · poc
https://github.com/horsehacks/CVE-2025-24813-checker
This repository contains a Python script that checks for the presence of CVE-2025-24813 by testing for PUT method support, Tomcat version, and write permissions in insecure directories. It does not exploit the vulnerability but scans for conditions that may indicate vulnerability.
Classification
Scanner 90%
Target:
Apache Tomcat (specific vulnerable versions not explicitly listed)
No auth needed
Prerequisites:
Network access to the target server · PUT method enabled on the server · Insecure directory with write permissions
nomisec
WORKING POC
by x1ongsec · remote
https://github.com/x1ongsec/CVE-2025-24813
This repository provides a proof-of-concept for CVE-2025-24813, a deserialization vulnerability in Apache Tomcat 9.0.98. It includes a pre-configured Tomcat environment and instructions for exploiting the vulnerability via partial PUT requests and session file manipulation.
Classification
Working Poc 90%
Attack Type
Deserialization
Target:
Apache Tomcat 9.0.98
No auth needed
Prerequisites:
DefaultServlet write functionality enabled · Partial PUT requests supported · File-based session persistence configured · Vulnerable deserialization library (e.g., commons-collections) in classpath
nomisec
WORKING POC
by sentilaso1 · remote
https://github.com/sentilaso1/CVE-2025-24813-Apache-Tomcat-RCE-PoC
This PoC exploits CVE-2025-24813, a deserialization vulnerability in Apache Tomcat, by uploading a malicious session file via HTTP PUT to achieve remote code execution. It supports both ysoserial and custom Java payloads for command execution.
Classification
Working Poc 95%
Target:
Apache Tomcat (versions 9.0.0.M1 to 9.0.98, 10.1.0-M1 to 10.1.34, 11.0.0-M1 to 11.0.2)
No auth needed
Prerequisites:
Target must allow HTTP PUT requests · ysoserial.jar or Java compiler for payload generation · Network access to the target
nomisec
WORKING POC
by gunyakit · remote
https://github.com/gunyakit/CVE-2025-24813-PoC-exploit
This is a functional PoC exploit for CVE-2025-24813, targeting Apache Tomcat via deserialization through partial PUT requests. It uploads a malicious session file and triggers deserialization to achieve RCE.
Classification
Working Poc 90%
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Partial PUT enabled · Vulnerable Commons Collections on classpath · Session persistence enabled
github
WORKING POC
by Anzinius · pythonpoc
https://github.com/Anzinius/CVE-PoC-Collection/tree/main/cve-2025-24813
The repository contains functional exploit code for CVE-2017-5487, demonstrating an information leak vulnerability in WordPress versions 4.7.0 and earlier via the /wp-json/wp/v2/users endpoint. The exploit sends a GET request to retrieve user details without proper access controls.
Classification
Working Poc 95%
Target:
WordPress versions 4.7.0 and earlier
No auth needed
Prerequisites:
Target WordPress instance with vulnerable version · Network access to the target
nomisec
WORKING POC
by Arthurabriel · poc
https://github.com/Arthurabriel/POC-CVE-2025-24813
This PoC demonstrates CVE-2025-24813, a vulnerability in Apache Tomcat's DefaultServlet with `readonly=false`, allowing unsafe file writes via HTTP PUT. It includes steps to exploit deserialization for RCE by uploading a malicious session file and triggering its execution.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Apache Tomcat 9 with JDK 11
No auth needed
Prerequisites:
Tomcat 9 with DefaultServlet configured for writes · PersistentManager with FileStore enabled · Ability to upload files to the server
nomisec
WORKING POC
by ps-interactive · remote
https://github.com/ps-interactive/lab-cve-2025-24813
This script uploads a serialized payload in chunks to a vulnerable endpoint, likely exploiting a deserialization vulnerability (CVE-2025-24813). The payload is sent via HTTP PUT requests with Content-Range headers to bypass size restrictions.
Classification
Working Poc 90%
Attack Type
Deserialization
Target:
Unknown (endpoint suggests a custom or proprietary application)
No auth needed
Prerequisites:
Network access to the target endpoint · A pre-generated serialized payload (payload.ser)
nomisec
WORKING POC
by CEAlbez · poc
https://github.com/CEAlbez/CVE-2025-24813-PoC
This PoC demonstrates CVE-2025-24813 by uploading a malicious payload via a PUT request and triggering it with a crafted GET request. The payload is decoded and executed using PowerShell, indicating a Remote Code Execution (RCE) vulnerability.
Classification
Working Poc 90%
Target:
Unspecified (likely a web application or server handling session files)
No auth needed
Prerequisites:
Network access to the target · Target application must be vulnerable to CVE-2025-24813
nomisec
WORKING POC
by n0n-zer0 · poc
https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813
This repository provides a proof-of-concept for CVE-2025-24813, which exploits a combination of vulnerabilities in Apache Tomcat's DefaultServlet and FileStore to achieve remote code execution via deserialization of session files.
Classification
Working Poc 90%
Target:
Apache Tomcat 10.1.24 (included in Spring Boot 3.3.0)
No auth needed
Prerequisites:
Tomcat with FileStore-based session persistence enabled · DefaultServlet configured with write permissions
nomisec
WORKING POC
by B1gN0Se · remote
https://github.com/B1gN0Se/Tomcat-CVE-2025-24813
This PoC exploits CVE-2025-24813, a deserialization vulnerability in Apache Tomcat, by uploading a malicious serialized payload via a PUT request to achieve remote code execution (RCE). The exploit requires specific configurations in Tomcat and a vulnerable library (e.g., commons-collections) to be present.
Classification
Working Poc 95%
Target:
Apache Tomcat 9.0.0.M1-9.0.98, 10.1.0-M1-10.1.34, 11.0.0-M1-11.0.2
No auth needed
Prerequisites:
DefaultServlet write function enabled (readonly=false) · Partial PUT request support · File session persistence enabled · Vulnerable deserialization library in classpath
nomisec
WORKING POC
by thebringerofdeath789 · remote
https://github.com/thebringerofdeath789/CVE-2025-24813
This exploit targets CVE-2025-24813 in Apache Tomcat by uploading a malicious serialized Java payload to the session directory and triggering deserialization via a crafted JSESSIONID cookie. It automates the download of ysoserial, generates payloads using multiple gadgets, and attempts to achieve remote code execution.
Classification
Working Poc 95%
Attack Type
Deserialization
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Network access to the target Tomcat server · Tomcat session directory must be writable · Java runtime environment for ysoserial
nomisec
WORKING POC
by ThHardvester · poc
https://github.com/ThHardvester/CVE-2025-24813
This PoC exploits CVE-2025-24813, a deserialization vulnerability in Apache Tomcat, by uploading a malicious serialized payload via PUT requests and triggering deserialization through session manipulation. It supports both ysoserial and custom Java payloads for command execution.
Classification
Working Poc 95%
Target:
Apache Tomcat (version not specified)
No auth needed
Prerequisites:
Target with writable servlet via PUT · Java runtime for payload generation · ysoserial.jar for ysoserial payloads
vulncheck_xdb
WORKING POC
remote
https://github.com/137f/PoC-CVE-2025-24813
This repository contains a functional exploit for CVE-2025-24813, targeting Apache Tomcat via Java deserialization and HTTP PUT method abuse to achieve remote code execution (RCE). The exploit includes detailed steps for session ID extraction, payload generation (using ysoserial or custom Java code), and payload delivery via path traversal.
Classification
Working Poc 95%
Target:
Apache Tomcat 11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, 9.0.0.M1 to 9.0.98
No auth needed
Prerequisites:
Python 3.x · Java JDK · ysoserial.jar · requests library
vulncheck_xdb
WORKING POC
remote
https://github.com/Eduardo-hardvester/CVE-2025-24813
This repository contains a functional exploit for CVE-2025-24813, targeting Apache Tomcat via deserialization. It includes payload generation (ysoserial or custom Java) and upload mechanisms to achieve RCE.
Classification
Working Poc 95%
Target:
Apache Tomcat
No auth needed
Prerequisites:
ysoserial.jar for payload generation · Java runtime · writable servlet endpoint
exploitdb
WORKING POC
by Al Baradi Joy · textwebappsmultiple
https://www.exploit-db.com/exploits/52134
This exploit leverages a path equivalence vulnerability in Apache Tomcat to upload a malicious serialized Java payload, which is then triggered via a crafted session cookie to achieve remote code execution. The payload is designed to trigger a DNS callback to an attacker-controlled server for verification.
Classification
Working Poc 90%
Target:
Apache Tomcat < 11.0.3 / 10.1.35 / 9.0.98
No auth needed
Prerequisites:
Network access to the target Tomcat server · Ability to send HTTP requests to the target · A listener or interactsh server to receive DNS callbacks
vulncheck_xdb
SCANNER
remote
https://github.com/FY036/cve-2025-24813_poc
The repository contains a Python script that scans for CVE-2025-24813 by sending crafted requests to detect deserialization vulnerabilities in Apache Tomcat. It does not include a full exploit chain but confirms vulnerability presence via HTTP response codes.
Classification
Scanner 90%
Attack Type
Deserialization
Target:
Apache Tomcat (9.0.0.M1-9.0.98, 10.1.0-M1-10.1.34, 11.0.0-M1-11.0.2)
No auth needed
Prerequisites:
network access to target Tomcat instance