Apache Tomcat: CVE-2025-24813

Apache Tomcat: CVE-2025-24813

What is CVE-2025-24813?

CVE-2025-24813 is a critical path equivalence vulnerability in Apache Tomcat, with exploitation attempts by threat actors observed in the wild. The vulnerability allows attackers to execute arbitrary code on vulnerable servers without authentication under specific conditions, potentially leading to system compromise and sensitive data being exposed.

Organizations affected by the configuration required for exploitation should patch CVE-2025-24813 to mitigate potential attacks and protect sensitive data from unauthorized access.

The vulnerability affects Tomcat versions 11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, and 9.0.0. M1 to 9.0.98. Additionally, Insikt Group’s analysis found that 8.5.x versions (specifically 8.5.0 to 8.5.98 and 8.5.100, with the exception of 8.5.99) are also vulnerable, though they were not included in the initial set of affected products by Apache.

Insikt Group’s Assessment of CVE-2025-24813

CVE-2025-24813 stems from Tomcat’s handling of partial PUT requests and allows remote, unauthenticated attackers to conduct remote code execution (RCE), view security-sensitive files, and inject content into those files.

Exploitation involves two primary steps:

However, successfully conducting RCE requires the following conditions:

If the following conditions are true, attackers can view sensitive security files and inject content into those files:

As such, only a limited number of Tomcat instances are likely to be affected by the configuration required for exploitation. For example, a GitHub code search query to check for the write permissions condition (<param-name>readonly< /param-name> AND "false" language:xml) shows only 218 open-source projects using this configuration.

Cybersecurity firm Greynoise has identified six malicious IP addresses attempting to exploit CVE-2025-24813, targeting systems in the US, Japan, Mexico, South Korea, and Australia. However, Insikt Group has not identified any evidence of successful exploitation or any evidence of known threat actors exploiting the vulnerability. At the time of writing, there were 378,444 exposed instances on Shodan. The specific versions are disclosed in the title and body of the servers’ responses.

Malicious IP Address
Source Location
Target Location
203.160.68[.]24
Hong Kong
US
176.65.138[.]172
Germany
Japan, Singapore, Hong Kong, Indonesia, Pakistan, Taiwan
38.126.114[.]186
US
India, Japan, Mexico, US
188.213.161[.]98
Italy
Japan, South Korea
140.143.182[.]115
China
US, Australia, Mexico, South Korea
196.240.54[.]120
Latvia
US

Table 1: Malicious IP addresses attempting to exploit CVE-2025-24813 (Source: Greynoise)

Multiple proof-of-concept (PoC) exploits have been published, including by Palo Alto Networks and GitHub user iSee857. These public exploits increase the likelihood of ongoing exploitation attempts. Insikt Group did not test these PoCs for efficacy or accuracy.

Indicators of compromise (IoCs):

CVE-2025-24813-01.png
Figure 1: The majority of exposed Tomcat instances on Shodan are geolocated in China, Brazil, Morocco, and the US (Sources: Shodan, Recorded Future)

Users should upgrade to version 11.0.3, 10.1.35 or 9.0.99. For end-of-life (EoL) 8.5.x versions, users should upgrade to a supported branch of Apache Tomcat. If upgrading is not immediately possible, users should implement network-level controls to restrict access to the Tomcat server.

How Recorded Future Can Help:

CVE-2025-24813-02.png
Figure 2: Vulnerability Intelligence Card for CVE-2025-24813 in Recorded Future (Source: Recorded Future)
CVE-2025-24813-03.png
Figure 3: Signature for CVE-2025-24813 in Recorded Future Attack Surface Intelligence® (Source: Recorded Future)

About Insikt Group: Recorded Future’s Insikt Group threat research team is comprised of analysts, linguists, and security researchers with deep government and industry experience.

Insikt Group publishes threat intelligence to the Recorded Future analyst community in blog posts and analyst notes.