Tomcat RCE in Write Enabled Default Servlet caused by internal dot
CVE-2025-24813 Published on March 10, 2025
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
Known Exploited Vulnerability
This Apache Tomcat Path Equivalence Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Apache Tomcat contains a path equivalence vulnerability that allows a remote attacker to execute code, disclose information, or inject malicious content via a partial PUT request.
The following remediation steps are recommended / required by April 22, 2025: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
CVE-2025-24813 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. It has the highest possible exploitability rating (3.9). The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
What is a Marshaling, Unmarshaling Vulnerability?
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
CVE-2025-24813 has been classified to as a Marshaling, Unmarshaling vulnerability or weakness.
Use of Incorrectly-Resolved Name or Reference
The software uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.
Products Associated with CVE-2025-24813
You can be notified by stack.watch whenever vulnerabilities like CVE-2025-24813 are published in these products:
What versions are vulnerable to CVE-2025-24813?
-
Apache Tomcat Version 9.0.0 milestone1
-
Apache Tomcat Version 9.0.0 milestone10
-
Apache Tomcat Version 9.0.0 milestone11
-
Apache Tomcat Version 9.0.0 milestone12
-
Apache Tomcat Version 9.0.0 milestone13
-
Apache Tomcat Version 9.0.0 milestone14
-
Apache Tomcat Version 9.0.0 milestone15
-
Apache Tomcat Version 9.0.0 milestone16
-
Apache Tomcat Version 9.0.0 milestone17
-
Apache Tomcat Version 9.0.0 milestone18
-
Apache Tomcat Version 9.0.0 milestone19
-
Apache Tomcat Version 9.0.0 milestone2
-
Apache Tomcat Version 9.0.0 milestone20
-
Apache Tomcat Version 9.0.0 milestone21
-
Apache Tomcat Version 9.0.0 milestone22
-
Apache Tomcat Version 9.0.0 milestone23
-
Apache Tomcat Version 9.0.0 milestone24
-
Apache Tomcat Version 9.0.0 milestone25
-
Apache Tomcat Version 9.0.0 milestone26
-
Apache Tomcat Version 9.0.0 milestone27
-
Apache Tomcat Version 9.0.0 milestone3
-
Apache Tomcat Version 9.0.0 milestone4
-
Apache Tomcat Version 9.0.0 milestone5
-
Apache Tomcat Version 9.0.0 milestone6
-
Apache Tomcat Version 9.0.0 milestone7
-
Apache Tomcat Version 9.0.0 milestone8
-
Apache Tomcat Version 9.0.0 milestone9
-
Apache Tomcat Version 10.1.0 milestone3
-
Apache Tomcat Version 10.1.0 milestone4
-
Apache Tomcat Version 10.1.0 milestone5
-
Apache Tomcat Version 10.1.0 milestone1
-
Apache Tomcat Version 10.1.0 milestone2
-
Apache Tomcat Version 10.1.0 milestone7
-
Apache Tomcat Version 10.1.0 milestone8
-
Apache Tomcat Version 10.1.0 milestone9
-
Apache Tomcat Version 10.1.0 milestone6
-
Apache Tomcat Version 10.1.0 milestone10
-
Apache Tomcat Version 10.1.0 milestone11
-
Apache Tomcat Version 10.1.0 milestone12
-
Apache Tomcat Version 10.1.0 milestone13
-
Apache Tomcat Version 10.1.0 milestone14
-
Apache Tomcat Version 10.1.0 milestone16
-
Apache Tomcat Version 10.1.0 milestone15
-
Apache Tomcat Version 10.1.0 milestone17
-
Apache Tomcat Version 11.0.0 milestone1
-
Apache Tomcat Version 11.0.0 milestone2
-
Apache Tomcat Version 11.0.0 milestone4
-
Apache Tomcat Version 11.0.0 milestone3
-
Apache Tomcat Version 11.0.0 milestone5
-
Apache Tomcat Version 11.0.0 milestone7
-
Apache Tomcat Version 11.0.0 milestone8
-
Apache Tomcat Version 11.0.0 milestone9
-
Apache Tomcat Version 11.0.0 milestone10
-
Apache Tomcat Version 11.0.0 milestone6
-
Apache Tomcat Version 10.1.0 milestone20
-
Apache Tomcat Version 10.1.0 milestone19
-
Apache Tomcat Version 10.1.0 milestone18
-
Apache Tomcat Version 11.0.0 milestone11
-
Apache Tomcat Version 11.0.0 milestone12
-
Apache Tomcat Version 11.0.0 milestone13
-
Apache Tomcat Version 11.0.0 milestone14
-
Apache Tomcat Version 11.0.0 milestone15
-
Apache Tomcat Version 11.0.0 milestone16
-
Apache Tomcat Version 11.0.0 milestone17
-
Apache Tomcat Version 11.0.0 milestone18
-
Apache Tomcat Version 11.0.0 milestone19
-
Apache Tomcat Version 11.0.0 milestone20
-
Apache Tomcat Version 10.1.1 Fixed in Version 10.1.35
-
Apache Tomcat Version 11.0.1 Fixed in Version 11.0.3
-
Apache Tomcat Version 9.0.1 Fixed in Version 9.0.99
-
Apache Tomcat Version 11.0.0 milestone21
-
Apache Tomcat Version 11.0.0 milestone22
-
Apache Tomcat Version 11.0.0 milestone23
-
Apache Tomcat Version 11.0.0 milestone24
-
Apache Tomcat Version 11.0.0 milestone25
-
Debian Linux Version 11.0