Full-text search. Typo-tolerant.

CVE-2025-24813 - [KEV] - CVSS 9.8

CVE-2025-24813 - [KEV] - CVSS 9.8

Overview

CVE-2025-24813 is a critical path equivalence vulnerability in Apache Tomcat that enables unauthenticated remote attackers to achieve remote code execution, disclose sensitive information, or inject malicious content through a crafted partial PUT request. The flaw stems from inconsistent handling of file paths when Tomcat processes partial PUT uploads, allowing an attacker to write files to locations that bypass intended access controls. Under specific configurations—where the default servlet has write enabled (readonly=false), partial PUTs are supported, file-based session persistence is in use with a session storage location accessible via uploads, and the application includes a deserialization-vulnerable library on its classpath—the vulnerability is escalated to unauthenticated RCE via Java session deserialization.

The CVSS base score is 9.8 (Critical), and the EPSS score of 0.942 reflects an extremely high likelihood of exploitation in the wild. CISA added the CVE to its Known Exploited Vulnerabilities (KEV) catalog on April 1, 2025, confirming active in-the-wild abuse.

Affected Products

Exploitation Evidence

ATT&CK Mapping

No formal ATT&CK mappings are present in the database, but the observed exploitation behavior aligns with the following techniques:

Threat Actor Context

No specific threat actor attribution is available in the database at this time. However, given the trivial exploitability, public PoC availability, EPSS above 0.94, and KEV listing, exploitation is expected from a broad range of actors including opportunistic botnet operators, cryptominers, initial access brokers, and ransomware affiliates targeting exposed Java application servers.

Recommended Actions