⚠ Actively exploited
Added to CISA KEV on 2025-04-01. Federal agencies required to patch by 2025-04-22. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..
CVE-2025-24813
Severity
9.8CRITICAL
EPSS
94.2%
top 0.08%
CISA KEV
KEV
Added 2025-04-01
Due 2025-04-22
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMar 10
KEV addedApr 1
KEV dueApr 22
Latest updateJul 15
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions
may also be affected…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages7 packages
Also affects: Debian Linux 11.0
🔴Vulnerability Details
6CVEList▶
Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT↗2025-03-10
OSV▶
Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT↗2025-03-10
GHSA▶
Apache Tomcat: Potential RCE and/or information disclosure and/or information corruption with partial PUT↗2025-03-10
💥Exploits & PoCs
2Nuclei▶
Apache Tomcat Path Equivalence - Remote Code Execution
🔍Detection Rules
1📋Vendor Advisories
7🕵️Threat Intelligence
7💬Community
1HackerOne▶
CVE-2025-24813: Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet↗2025-04-27