// For flags

CVE-2025-24813

Apache Tomcat Path Equivalence Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

37
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- application was using Tomcat's file based session persistence with the default storage location
- application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.98, which fixes the issue.

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- application was using Tomcat's file based session persistence with the default storage location
- application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.

A flaw was found in Apache Tomcat. In certain conditions and configurations, this vulnerability allows a remote attacker to exploit a path equivalence flaw to view file system contents and add malicious content via a write-enabled Default Servlet in Apache Tomcat. For the vulnerability to be exploited, the following conditions must be true: writes to the default servlet are enabled (disabled by default), sensitive file uploads are sub-directories of a target URL for public uploads, attackers know the names of the files, and those files are subject to partial PUT uploads enabled by default. If an application uses file-based session persistence with default storage and includes exploitable libraries, remote code execution (RCE) is possible.

Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.

A security vulnerability was found in Tomcat 10, a Java based web server and servlet engine. A malicious user was able to view security sensitive files and/or inject content into those files when writes were enabled for the default servlet (disabled by default) and support for partial PUT was enabled (default). Under certain circumstances, depending on the application in use, remote code execution may have been possible.

Apache Tomcat contains a path equivalence vulnerability that allows a remote attacker to execute code, disclose information, or inject malicious content via a partial PUT request.

*Credits: COSCO Shipping Lines DIC, sw0rd1ight (https://github.com/sw0rd1ight)
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2025-01-24 CVE Reserved
  • 2025-03-10 CVE Published
  • 2025-03-14 First Exploit
  • 2025-04-01 Exploited in Wild
  • 2025-04-02 CVE Updated
  • 2025-04-22 KEV Due Date
  • 2025-05-19 EPSS Updated
CWE
  • CWE-44: Path Equivalence: 'file.name' (Internal Dot)
  • CWE-502: Deserialization of Untrusted Data
CAPEC
References (42)
URL Date SRC
https://packetstorm.news/files/id/189826 2025-03-17
https://packetstorm.news/files/id/190252 2025-04-03
https://packetstorm.news/files/id/190287 2025-04-07
https://github.com/iSee857/CVE-2025-24813-PoC 2025-03-14
https://github.com/N0c1or/CVE-2025-24813_POC 2025-03-14
https://github.com/gregk4sec/CVE-2025-24813 2025-03-14
https://github.com/absholi7ly/POC-CVE-2025-24813 2025-03-14
https://github.com/FY036/cve-2025-24813_poc 2025-03-14
https://github.com/charis3306/CVE-2025-24813 2025-03-16
https://github.com/issamjr/CVE-2025-24813-Scanner 2025-03-17
https://github.com/imbas007/CVE-2025-24813-apache-tomcat 2025-03-17
https://github.com/msadeghkarimi/CVE-2025-24813-Exploit 2025-03-18
https://github.com/naikordian/CVE-2025-24813 2025-03-18
https://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813 2025-03-19
https://github.com/ps-interactive/lab-cve-2025-24813 2025-03-25
https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813 2025-03-20
https://github.com/Alaatk/CVE-2025-24813-POC 2025-03-22
https://github.com/MuhammadWaseem29/CVE-2025-24813 2025-03-22
https://github.com/tonyarris/CVE-2025-24813-PoC 2025-03-23
https://github.com/beyond-devsecops/CVE-2025-24813 2025-03-24
https://github.com/u238/Tomcat-CVE_2025_24813 2025-03-25
https://github.com/AlperenY-cs/CVE-2025-24813 2025-03-28
https://github.com/manjula-aw/CVE-2025-24813 2025-03-30
https://github.com/B1gN0Se/Tomcat-CVE-2025-24813 2025-03-31
https://github.com/AsaL1n/CVE-2025-24813 2025-04-10
https://github.com/La3B0z/CVE-2025-24813-POC 2025-04-06
https://github.com/Heimd411/CVE-2025-24813-noPoC 2025-04-07
https://github.com/horsehacks/CVE-2025-24813-checker 2025-04-07
https://github.com/GadaLuBau1337/CVE-2025-24813 2025-04-08
https://github.com/f8l124/CVE-2025-24813-POC 2025-04-09
https://github.com/Franconyu/Poc_for_CVE-2025-24813 2025-04-14
https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE 2025-04-25
https://github.com/Mattb709/CVE-2025-24813-Scanner 2025-04-13
https://github.com/Erosion2020/CVE-2025-24813-vulhub 2025-04-25
https://github.com/hakankarabacak/CVE-2025-24813 2025-04-28
https://github.com/Eduardo-hardvester/CVE-2025-24813 2025-05-10
https://github.com/fatkz/CVE-2025-24813 2025-05-11
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache Software Foundation
Search vendor "Apache Software Foundation"
Apache Tomcat
Search vendor "Apache Software Foundation" for product "Apache Tomcat"
>= 11.0.0-M1 <= 11.0.2
Search vendor "Apache Software Foundation" for product "Apache Tomcat" and version " >= 11.0.0-M1 <= 11.0.2"
en
Affected
Apache Software Foundation
Search vendor "Apache Software Foundation"
Apache Tomcat
Search vendor "Apache Software Foundation" for product "Apache Tomcat"
>= 10.1.0-M1 <= 10.1.34
Search vendor "Apache Software Foundation" for product "Apache Tomcat" and version " >= 10.1.0-M1 <= 10.1.34"
en
Affected
Apache Software Foundation
Search vendor "Apache Software Foundation"
Apache Tomcat
Search vendor "Apache Software Foundation" for product "Apache Tomcat"
>= 9.0.0.M1 <= 9.0.98
Search vendor "Apache Software Foundation" for product "Apache Tomcat" and version " >= 9.0.0.M1 <= 9.0.98"
en
Affected