A newly discovered severe remote code execution (RCE) flaw in Apache Tomcat, tracked as CVE-2025-24813, is being actively exploited in the wild. Attackers are using a simple PUT request to take over vulnerable servers. Exploit code was published just 30 hours after the vulnerability disclosure, allowing threat actors to leverage base64-encoded payloads that bypass traditional security tools.
1. CVE-2025-24813 is a remote code execution, information disclosure, and malicious content injection issue in Apache Tomcat. CVSS Score: Not Available.
2. Versions Affected: Apache Tomcat 11.0.0-M1 to 11.0.2; Apache Tomcat 10.1.0-M1 to 10.1.34; and Apache Tomcat 9.0.0.M1 to 9.0.98.
3. The root cause of this vulnerability lies in the way Tomcat handles session data, and the partial PUT requests. Specifically:
4. The exploit for CVE-2025-24813 was first published by a user named iSee857 on a Chinese forum and quickly gained traction, with the proof-of-concept (PoC) already available online.
5. The exploit involves two key steps:
6. The exploit is effective because it does not trigger alarms in traditional security systems due to:
Recommendations:
SOURCES:
Enjoyed reading this Threat Intelligence Advisory? Stay updated with our latest exclusive content by following us on Twitter and LinkedIn.
No related posts found.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
This website uses the following additional cookies:
(List the cookies that you are using on the website here.)
More information about our Cookie Policy