CVE-2025-24813

CRITICAL KEV NUCLEI

Tomcat Partial PUT Java Deserialization

Title source: metasploit

Description

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.

Exploits (60)

nomisec WORKING POC 184 stars
by absholi7ly · remote
https://github.com/absholi7ly/POC-CVE-2025-24813
nomisec WORKING POC 95 stars
by iSee857 · remote
https://github.com/iSee857/CVE-2025-24813-PoC
nomisec WORKING POC 19 stars
by mbanyamer · remote
https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813-
nomisec WORKING POC 17 stars
by drcrypterdotru · remote
https://github.com/drcrypterdotru/Apache-GOExploiter
nomisec WORKING POC 16 stars
by charis3306 · remote
https://github.com/charis3306/CVE-2025-24813
nomisec WORKING POC 11 stars
by qzy0x · poc
https://github.com/qzy0x/cve-2025-24813_poc
nomisec WORKING POC 8 stars
by Franconyu · remote
https://github.com/Franconyu/Poc_for_CVE-2025-24813
nomisec SCANNER 7 stars
by x00byte · poc
https://github.com/x00byte/PutScanner
nomisec WORKING POC 6 stars
by u238 · remote
https://github.com/u238/Tomcat-CVE_2025_24813
nomisec WORKING POC 5 stars
by Erosion2020 · remote
https://github.com/Erosion2020/CVE-2025-24813-vulhub
nomisec SCANNER 5 stars
by msadeghkarimi · remote
https://github.com/msadeghkarimi/CVE-2025-24813-Exploit
nomisec SCANNER 5 stars
by Mattb709 · remote
https://github.com/Mattb709/CVE-2025-24813-Scanner
nomisec SCANNER 4 stars
by cchopin · poc
https://github.com/cchopin/CVE-Arsenal-Lab
nomisec WORKING POC 4 stars
by Mattb709 · remote
https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE
nomisec WORKING POC 4 stars
by Shivshantp · poc
https://github.com/Shivshantp/CVE-2025-24813
nomisec WORKING POC 4 stars
by AsaL1n · remote
https://github.com/AsaL1n/CVE-2025-24813
nomisec WRITEUP 3 stars
by AlperenY-cs · poc
https://github.com/AlperenY-cs/CVE-2025-24813
nomisec SCANNER 3 stars
by imbas007 · poc
https://github.com/imbas007/CVE-2025-24813-apache-tomcat
nomisec WORKING POC 3 stars
by N0c1or · remote
https://github.com/N0c1or/CVE-2025-24813_POC
nomisec WORKING POC 3 stars
by Alaatk · remote
https://github.com/Alaatk/CVE-2025-24813-POC
nomisec WORKING POC 3 stars
by beyond-devsecops · remote
https://github.com/beyond-devsecops/CVE-2025-24813
nomisec WORKING POC 2 stars
by pirenga · poc
https://github.com/pirenga/CVE-2025-24813
nomisec WORKING POC 1 stars
by gregk4sec · remote
https://github.com/gregk4sec/CVE-2025-24813
nomisec WORKING POC 1 stars
by La3B0z · poc
https://github.com/La3B0z/CVE-2025-24813-POC
nomisec WORKING POC 1 stars
by tonyarris · remote
https://github.com/tonyarris/CVE-2025-24813-PoC
nomisec WORKING POC 1 stars
by manjula-aw · remote
https://github.com/manjula-aw/CVE-2025-24813
nomisec WORKING POC 1 stars
by MuhammadWaseem29 · remote
https://github.com/MuhammadWaseem29/CVE-2025-24813
nomisec WORKING POC 1 stars
by GadaLuBau1337 · remote
https://github.com/GadaLuBau1337/CVE-2025-24813
nomisec WORKING POC 1 stars
by fatkz · remote
https://github.com/fatkz/CVE-2025-24813
nomisec WORKING POC 1 stars
by cyglegit · remote
https://github.com/cyglegit/CVE-2025-24813
nomisec WORKING POC 1 stars
by seahcy · remote
https://github.com/seahcy/CVE-2025-24813
nomisec WORKING POC 1 stars
by ftz7 · poc
https://github.com/ftz7/PoC-CVE-2025-24813
nomisec SCANNER
by michael-david-fry · poc
https://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813
nomisec WRITEUP
by Heimd411 · poc
https://github.com/Heimd411/CVE-2025-24813-noPoC
github WORKING POC
by manus-use · postscriptpoc
https://github.com/manus-use/cve-pocs/tree/main/Tomcat-CVE-2025-24813
nomisec WORKING POC
by yaleman · poc
https://github.com/yaleman/cve-2025-24813-poc
nomisec WORKING POC
by threadpoolx · poc
https://github.com/threadpoolx/CVE-2025-24813-Remote-Code-Execution-in-Apache-Tomcat
nomisec WORKING POC
by GongWook · poc
https://github.com/GongWook/CVE-2025-24813
nomisec WORKING POC
by Makavellik · poc
https://github.com/Makavellik/POC-CVE-2025-24813-Apache-Tomcat-Remote-Code-Execution
nomisec WORKING POC
by hakankarabacak · remote
https://github.com/hakankarabacak/CVE-2025-24813
nomisec WORKING POC
by f8l124 · poc
https://github.com/f8l124/CVE-2025-24813-POC
nomisec SCANNER
by horsehacks · poc
https://github.com/horsehacks/CVE-2025-24813-checker
nomisec WORKING POC
by x1ongsec · remote
https://github.com/x1ongsec/CVE-2025-24813
nomisec WORKING POC
by sentilaso1 · remote
https://github.com/sentilaso1/CVE-2025-24813-Apache-Tomcat-RCE-PoC
nomisec WORKING POC
by gunyakit · remote
https://github.com/gunyakit/CVE-2025-24813-PoC-exploit
github WORKING POC
by Anzinius · pythonpoc
https://github.com/Anzinius/CVE-PoC-Collection/tree/main/cve-2025-24813
nomisec WORKING POC
by Arthurabriel · poc
https://github.com/Arthurabriel/POC-CVE-2025-24813
nomisec WORKING POC
by ps-interactive · remote
https://github.com/ps-interactive/lab-cve-2025-24813
nomisec WORKING POC
by CEAlbez · poc
https://github.com/CEAlbez/CVE-2025-24813-PoC
nomisec WORKING POC
by n0n-zer0 · poc
https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813
nomisec WORKING POC
by B1gN0Se · remote
https://github.com/B1gN0Se/Tomcat-CVE-2025-24813
nomisec WORKING POC
by thebringerofdeath789 · remote
https://github.com/thebringerofdeath789/CVE-2025-24813
nomisec WORKING POC
by ThHardvester · poc
https://github.com/ThHardvester/CVE-2025-24813
metasploit WORKING POC EXCELLENT
by sw0rd1ight, Calum Hutton, h4ck3r-04 · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/tomcat_partial_put_deserialization.rb
vulncheck_xdb WORKING POC
remote
https://github.com/137f/PoC-CVE-2025-24813
vulncheck_xdb WORKING POC
remote
https://github.com/Eduardo-hardvester/CVE-2025-24813
exploitdb WORKING POC
by Al Baradi Joy · textwebappsmultiple
https://www.exploit-db.com/exploits/52134
vulncheck_xdb SCANNER
remote
https://github.com/FY036/cve-2025-24813_poc

Nuclei Templates (1)

Apache Tomcat Path Equivalence - Remote Code Execution
CRITICALVERIFIEDby iamnoooob,rootxharsh,pdresearch,theMiddle
Shodan: http.component:"apache tomcat" || cpe:"cpe:2.3:a:apache:tomcat" || http.html:"apache tomcat" || http.html:"jk status manager" || http.title:"apache tomcat" || product:"tomcat"
FOFA: server=="apache tomcat" || body="apache tomcat" || body="jk status manager" || title="apache tomcat"

Scores

CVSS v3 9.8
EPSS 0.9423
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2025-04-01
VulnCheck KEV 2025-03-14
ENISA EUVD EUVD-2025-6498

Classification

CWE
CWE-502 CWE-706 CWE-44
Status published

Affected Products (50)

apache/tomcat < 9.0.99
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
apache/tomcat
... and 35 more

Timeline

Published Mar 10, 2025
KEV Added Apr 01, 2025
Tracked Since Feb 18, 2026