Palo Alto Networks’ Unit 42 has identified three critical vulnerabilities impacting Apache Tomcat and Apache Camel, disclosed in March 2025. These vulnerabilities, CVE-2025-24813 (Tomcat), CVE-2025-27636, and CVE-2025-29891 (Camel), enable remote code execution (RCE). These flaws represent a significant threat due to the widespread deployment of Tomcat for Java-based web applications and Camel for enterprise messaging and system integration. Shortly after disclosure, proof-of-concept (PoC) exploits were released, and mass scanning and exploitation attempts surged.
1. CVE-2025-24813 – Apache Tomcat Partial PUT Remote Code Execution
Description:This vulnerability stems from Tomcat’s support for partial PUT requests when session persistence is enabled. A crafted HTTP PUT request using the Content-Range header allows an attacker to write serialized payloads into the Tomcat cache directory as session files. By manipulating the JSESSIONID in a follow-up request, the attacker can trigger deserialization and execute malicious code.
Preconditions for Exploitation:
Impact:
Exploit Pattern:
2. CVE-2025-27636 & CVE-2025-29891 – Apache Camel Header Injection RCE
Description:Apache Camel uses a case-sensitive filtering mechanism to block internal headers such as CamelExecCommandExecutable. Attackers can bypass this control by manipulating header casing (e.g., CAmelExecCommandExecutable). If vulnerable components like camel-exec are present, these headers can result in direct command execution.
Root Cause:
3. Exploit Activity and TelemetryOver 125,856 scans/probes/exploit attempts recorded globally in March 2025
Primary Targets: Internet-facing Tomcat and Camel deploymentsTop Scanning Countries: >70 nations involved in probingTools like ProjectDiscovery’s Nuclei Scanner used for mass scanning
Common exploit traits:
Over 7,800 confirmed CVE-2025-24813 exploitation attempts.
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy