CVE-2025-24813

Scores

EPSS

0.942high94.2%
0%20%40%60%80%100%

Percentile: 94.2%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Description

Path Equivalence: ‘file.Name’ (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.
The following versions were EOL at the time the CVE was created but are
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions
may also be affected.

If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT

If all of the following were true, a malicious user was able to perform remote code execution:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- application was using Tomcat’s file based session persistence with the default storage location
- application included a library that may be leveraged in a deserialization attack

Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesdebiannvdredhatubuntu

CWEs

20CWE-44CWE-502

Related Vulnerabilities

Exploits

Exploit ID: 52134

Source: exploitdb

URL: https://www.exploit-db.com/exploits/52134

Exploit ID: CVE-2025-24813

Source: github-poc

URL: https://github.com/EQSTLab/CVE-2025-24813

Vulnerable Software (26)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:apache:tomcat-catalina:*:*:*:*:*:maven:*:*",          "versionEndExcluding": "11.0.3",          "versionStartI...

Source: anchore_overrides

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:apache:tomcat-embed-core:*:*:*:*:*:maven:*:*",          "versionEndExcluding": "11.0.3",          "versionStar...

Source: anchore_overrides

Type: Configuration

Product: tomcat

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.37-alt0.c9.2"}

Source: redhat

Type: Configuration

Product: tomcat-admin-webapps

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.37-alt0.c9.2"}

Source: redhat

Type: Configuration

Product: tomcat-docs-webapp

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.37-alt0.c9.2"}

Source: redhat

Type: Configuration

Product: tomcat-el-3.0-api

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.37-alt0.c9.2"}

Source: redhat

Type: Configuration

Product: tomcat-jsp-2.3-api

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.37-alt0.c9.2"}

Source: redhat

Type: Configuration

Product: tomcat-jsvc

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.37-alt0.c9.2"}

Source: redhat

Type: Configuration

Product: tomcat-lib

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.37-alt0.c9.2"}

Source: redhat

Type: Configuration

Product: tomcat-servlet-4.0-api

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.37-alt0.c9.2"}

Source: redhat

Type: Configuration

Product: tomcat-webapps

Operating System: altlinux

Trait:
{  "fixed": "1:9.0.37-alt0.c9.2"}

Source: redhat

Type: Configuration

Product: tomcat10

Operating System: ubuntu noble 24.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: ubuntu oracular 24.10

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: ubuntu plucky 25.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: ubuntu questing 25.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: tomcat10

Operating System: debian

Trait:
{  "fixed": "10.1.35-1"}

Source: debian

Type: Configuration

Product: tomcat9

Operating System: ubuntu oracular 24.10

Trait:
{  "fixed": "9.0.70-2ubuntu1.24.10.1"}

Source: ubuntu

Type: Configuration

Product: tomcat9

Operating System: ubuntu plucky 25.04

Trait:
{  "fixed": "9.0.70-2ubuntu1.25.04.1"}

Source: ubuntu

Type: Configuration

Product: tomcat9

Operating System: ubuntu questing 25.10

Trait:
{  "fixed": "9.0.70-2ubuntu2"}

Source: ubuntu

Type: Configuration

Product: tomcat9

Operating System: debian

Trait:
{  "fixed": "9.0.70-2"}

Source: debian