Vulnerability Details CVE-2025-24813
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.
This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.
If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
- attacker knowledge of the names of security sensitive files being uploaded
- the security sensitive files also being uploaded via partial PUT
If all of the following were true, a malicious user was able to perform remote code execution:
- writes enabled for the default servlet (disabled by default)
- support for partial PUT (enabled by default)
- application was using Tomcat's file based session persistence with the default storage location
- application included a library that may be leveraged in a deserialization attack
Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.932
EPSS Ranking 99.8%
CVSS Severity
CVSS v3 Score 9.8
Proposed Action
Apache Tomcat contains a path equivalence vulnerability that allows a remote attacker to execute code, disclose information, or inject malicious content via a partial PUT request.
Ransomware Campaign
Unknown
Products affected by CVE-2025-24813
-
cpe:2.3:a:apache:tomcat:10.1.0
-
cpe:2.3:a:apache:tomcat:10.1.1
-
cpe:2.3:a:apache:tomcat:10.1.10
-
cpe:2.3:a:apache:tomcat:10.1.11
-
cpe:2.3:a:apache:tomcat:10.1.12
-
cpe:2.3:a:apache:tomcat:10.1.13
-
cpe:2.3:a:apache:tomcat:10.1.14
-
cpe:2.3:a:apache:tomcat:10.1.15
-
cpe:2.3:a:apache:tomcat:10.1.16
-
cpe:2.3:a:apache:tomcat:10.1.17
-
cpe:2.3:a:apache:tomcat:10.1.18
-
cpe:2.3:a:apache:tomcat:10.1.19
-
cpe:2.3:a:apache:tomcat:10.1.2
-
cpe:2.3:a:apache:tomcat:10.1.20
-
cpe:2.3:a:apache:tomcat:10.1.22
-
cpe:2.3:a:apache:tomcat:10.1.23
-
cpe:2.3:a:apache:tomcat:10.1.24
-
cpe:2.3:a:apache:tomcat:10.1.25
-
cpe:2.3:a:apache:tomcat:10.1.26
-
cpe:2.3:a:apache:tomcat:10.1.27
-
cpe:2.3:a:apache:tomcat:10.1.28
-
cpe:2.3:a:apache:tomcat:10.1.29
-
cpe:2.3:a:apache:tomcat:10.1.30
-
cpe:2.3:a:apache:tomcat:10.1.31
-
cpe:2.3:a:apache:tomcat:10.1.32
-
cpe:2.3:a:apache:tomcat:10.1.33
-
cpe:2.3:a:apache:tomcat:10.1.34
-
cpe:2.3:a:apache:tomcat:10.1.5
-
cpe:2.3:a:apache:tomcat:10.1.6
-
cpe:2.3:a:apache:tomcat:10.1.7
-
cpe:2.3:a:apache:tomcat:10.1.8
-
cpe:2.3:a:apache:tomcat:10.1.9
-
cpe:2.3:a:apache:tomcat:11.0.0
-
cpe:2.3:a:apache:tomcat:11.0.1
-
cpe:2.3:a:apache:tomcat:11.0.2
-
cpe:2.3:a:apache:tomcat:9.0.0
-
cpe:2.3:a:apache:tomcat:9.0.1
-
cpe:2.3:a:apache:tomcat:9.0.10
-
cpe:2.3:a:apache:tomcat:9.0.11
-
cpe:2.3:a:apache:tomcat:9.0.12
-
cpe:2.3:a:apache:tomcat:9.0.13
-
cpe:2.3:a:apache:tomcat:9.0.14
-
cpe:2.3:a:apache:tomcat:9.0.15
-
cpe:2.3:a:apache:tomcat:9.0.16
-
cpe:2.3:a:apache:tomcat:9.0.17
-
cpe:2.3:a:apache:tomcat:9.0.18
-
cpe:2.3:a:apache:tomcat:9.0.19
-
cpe:2.3:a:apache:tomcat:9.0.2
-
cpe:2.3:a:apache:tomcat:9.0.20
-
cpe:2.3:a:apache:tomcat:9.0.21
-
cpe:2.3:a:apache:tomcat:9.0.22
-
cpe:2.3:a:apache:tomcat:9.0.23
-
cpe:2.3:a:apache:tomcat:9.0.24
-
cpe:2.3:a:apache:tomcat:9.0.25
-
cpe:2.3:a:apache:tomcat:9.0.26
-
cpe:2.3:a:apache:tomcat:9.0.27
-
cpe:2.3:a:apache:tomcat:9.0.28
-
cpe:2.3:a:apache:tomcat:9.0.29
-
cpe:2.3:a:apache:tomcat:9.0.3
-
cpe:2.3:a:apache:tomcat:9.0.30
-
cpe:2.3:a:apache:tomcat:9.0.31
-
cpe:2.3:a:apache:tomcat:9.0.32
-
cpe:2.3:a:apache:tomcat:9.0.33
-
cpe:2.3:a:apache:tomcat:9.0.34
-
cpe:2.3:a:apache:tomcat:9.0.35
-
cpe:2.3:a:apache:tomcat:9.0.35-3.39.1
-
cpe:2.3:a:apache:tomcat:9.0.35-3.57.3
-
cpe:2.3:a:apache:tomcat:9.0.36
-
cpe:2.3:a:apache:tomcat:9.0.37
-
cpe:2.3:a:apache:tomcat:9.0.38
-
cpe:2.3:a:apache:tomcat:9.0.39
-
cpe:2.3:a:apache:tomcat:9.0.4
-
cpe:2.3:a:apache:tomcat:9.0.40
-
cpe:2.3:a:apache:tomcat:9.0.41
-
cpe:2.3:a:apache:tomcat:9.0.42
-
cpe:2.3:a:apache:tomcat:9.0.43
-
cpe:2.3:a:apache:tomcat:9.0.44
-
cpe:2.3:a:apache:tomcat:9.0.45
-
cpe:2.3:a:apache:tomcat:9.0.46
-
cpe:2.3:a:apache:tomcat:9.0.47
-
cpe:2.3:a:apache:tomcat:9.0.48
-
cpe:2.3:a:apache:tomcat:9.0.49
-
cpe:2.3:a:apache:tomcat:9.0.5
-
cpe:2.3:a:apache:tomcat:9.0.50
-
cpe:2.3:a:apache:tomcat:9.0.51
-
cpe:2.3:a:apache:tomcat:9.0.52
-
cpe:2.3:a:apache:tomcat:9.0.53
-
cpe:2.3:a:apache:tomcat:9.0.54
-
cpe:2.3:a:apache:tomcat:9.0.55
-
cpe:2.3:a:apache:tomcat:9.0.56
-
cpe:2.3:a:apache:tomcat:9.0.57
-
cpe:2.3:a:apache:tomcat:9.0.58
-
cpe:2.3:a:apache:tomcat:9.0.59
-
cpe:2.3:a:apache:tomcat:9.0.6
-
cpe:2.3:a:apache:tomcat:9.0.60
-
cpe:2.3:a:apache:tomcat:9.0.61
-
cpe:2.3:a:apache:tomcat:9.0.62
-
cpe:2.3:a:apache:tomcat:9.0.63
-
cpe:2.3:a:apache:tomcat:9.0.64
-
cpe:2.3:a:apache:tomcat:9.0.65
-
cpe:2.3:a:apache:tomcat:9.0.67
-
cpe:2.3:a:apache:tomcat:9.0.68
-
cpe:2.3:a:apache:tomcat:9.0.69
-
cpe:2.3:a:apache:tomcat:9.0.7
-
cpe:2.3:a:apache:tomcat:9.0.70
-
cpe:2.3:a:apache:tomcat:9.0.71
-
cpe:2.3:a:apache:tomcat:9.0.72
-
cpe:2.3:a:apache:tomcat:9.0.73
-
cpe:2.3:a:apache:tomcat:9.0.74
-
cpe:2.3:a:apache:tomcat:9.0.75
-
cpe:2.3:a:apache:tomcat:9.0.76
-
cpe:2.3:a:apache:tomcat:9.0.77
-
cpe:2.3:a:apache:tomcat:9.0.78
-
cpe:2.3:a:apache:tomcat:9.0.79
-
cpe:2.3:a:apache:tomcat:9.0.8
-
cpe:2.3:a:apache:tomcat:9.0.80
-
cpe:2.3:a:apache:tomcat:9.0.81
-
cpe:2.3:a:apache:tomcat:9.0.82
-
cpe:2.3:a:apache:tomcat:9.0.83
-
cpe:2.3:a:apache:tomcat:9.0.84
-
cpe:2.3:a:apache:tomcat:9.0.85
-
cpe:2.3:a:apache:tomcat:9.0.86
-
cpe:2.3:a:apache:tomcat:9.0.87
-
cpe:2.3:a:apache:tomcat:9.0.88
-
cpe:2.3:a:apache:tomcat:9.0.89
-
cpe:2.3:a:apache:tomcat:9.0.9
-
cpe:2.3:a:apache:tomcat:9.0.90
-
cpe:2.3:a:apache:tomcat:9.0.91
-
cpe:2.3:a:apache:tomcat:9.0.92
-
cpe:2.3:a:apache:tomcat:9.0.93
-
cpe:2.3:a:apache:tomcat:9.0.94
-
cpe:2.3:a:apache:tomcat:9.0.95
-
cpe:2.3:a:apache:tomcat:9.0.96
-
cpe:2.3:a:apache:tomcat:9.0.97
-
cpe:2.3:a:apache:tomcat:9.0.98
-
cpe:2.3:o:debian:debian_linux:11.0