Want to stay ahead of threats in 2025? This research report is all you need to stay updated.

CVE-2025-24813

Unauthenticated Remote Code Execution in Apache Tomcat via Partial PUT and Session Deserialization: Breaking Down CVE-2025-24813

Vulnerability Overview 

CVE ID: CVE-2025-24813 

CVE Title: Apache Tomcat: Potential RCE and/or Information Disclosure and/or Information Corruption with Partial PUT 

Severity: Critical 

Exploit Status: Proof of Concept (PoC) 

Business Risk: High — allows remote code execution and data compromise on vulnerable Tomcat servers, with the potential for significant operational disruption and reputational damage 

Compliance Impact: Potential violations of PCI-DSS, HIPAA, NIST, and GDPR due to unauthorized access and data exposure

Summary

CVE-2025-24813 is a critical unauthenticated remote code execution (RCE) vulnerability in Apache Tomcat’s partial PUT feature. Exploitation enables attackers to execute arbitrary code on affected servers under specific, non-default configurations. Immediate patching or mitigation is required to prevent compromise of business-critical systems.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-24813?

Technical Overview

How Does the CVE-2025-24813 Exploit Work?

The attack typically follows these steps:

What Causes CVE-2025-24813?

Vulnerability Root Cause:  

This flaw is caused by Apache Tomcat mishandling partial PUT requests—it swaps slashes for dots in filenames, which attackers abuse to save files outside intended folders. If file-based session storage is enabled, they can upload a malicious serialized Java object to a session file. When Tomcat reads (deserializes) this file, it executes the embedded code, giving attackers remote control over the server.

How Can You Mitigate CVE-2025-24813?

If immediate patching is delayed or not possible:

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE-2025-24813 Cause Downtime?

How Can You Detect CVE-2025-24813 Exploitation?

Exploitation Signatures:

Indicators of Compromise (IOCs/IOAs):

Alerting Strategy:

Remediation & Response

Patch/Upgrade Instructions:

Incident Response Considerations:

Compliance & Governance Notes

Standards Impacted:

Audit Trail Requirement:

Log all HTTP PUT/GET requests, session file access, and administrative changes to Tomcat configuration.

Policy Alignment:

Review and update web server hardening policies to enforce least privilege and restrict write access to servlets. 

CVSS Breakdown Table

MetricValue Description
Base Score9.8 (Critical) Critical severity with maximum impact and minimal exploit complexity
Attack VectorNetwork Vulnerability is exploitable over the network without physical access
Attack ComplexityLowExploitation requires no special conditions
Privileges RequiredNoneRemote attacker does not need any privileges
User Interaction NoneNo user interaction is necessary to trigger the exploit
Scope Unchanged Impact is contained within Tomcat, not expanding to other components
Confidentiality Impact HighCan lead to full data exposure
Integrity Impact HighEnables unauthorized modification or injection of content
Availability ImpactHighMay result in system compromise or denial of service

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.