Monday, April 14, 2025
HomeApacheApache Tomcat Vulnerability Exploited to Execute Malicious Arbitrary Code on Servers

Apache Tomcat Vulnerability Exploited to Execute Malicious Arbitrary Code on Servers

Published on

SIEM as a Service

Follow Us on Google News

A critical remote code execution (RCE) vulnerability, tracked as CVE-2025-24813, is being actively exploited in Apache Tomcat servers.

Critical RCE Flaw in Apache Tomcat

The flaw allows attackers to upload malicious files via unauthenticated HTTP PUT requests, followed by a GET request to trigger deserialization, leading to arbitrary code execution.

Affected versions include Tomcat 9.0.0-M1 to 9.0.98, 10.1.0-M1 to 10.1.34, and 11.0.0-M1 to 11.0.2.

- Advertisement - Google News
Apache Tomcat
Vulnerability Intelligence Card for CVE-2025-24813 i

Patched versions (9.0.99, 10.1.35, and 11.0.3) were released, but exploitation began within 30 hours of disclosure, with proof-of-concept (PoC) exploits circulating publicly.

Exploitation and Attack Patterns

Attackers leverage partial PUT requests to upload serialized payloads to writable directories, often targeting file-based session persistence.

Successful exploitation requires non-default configurations, such as enabled default servlet write permissions and deserialization-vulnerable libraries.

GreyNoise observed attacks originating from Latvia, Italy, the U.S., and China, with 70% targeting U.S. systems.

According to the Report, payloads are often obfuscated with Base64 to evade detection.

Organizations should upgrade to patched versions or disable partial PUT support and restrict write permissions.

Monitoring for unexpected JSP files or PUT/GET requests in logs is advised.

Security firms like Akamai and Cloudflare note that exploitation requires specific server configurations, limiting widespread impact.

However, the ease of exploitation and Tomcat’s widespread use make this a high-priority threat.

Find this News Interesting! Follow us on Google NewsLinkedIn, and X to Get Instant Updates!

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks

A new wave of cyber espionage attacks has brought BPFDoor malware into the spotlight...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on...

Smishing Campaign Hits Toll Road Users with $5 Payment Scam

Cybersecurity researchers at Cisco Talos have uncovered a large-scale smishing campaign targeting toll road...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

BPFDoor Malware Uses Reverse Shell to Expand Control Over Compromised Networks

A new wave of cyber espionage attacks has brought BPFDoor malware into the spotlight...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...

Morocco Investigation Major Data Breach Allegedly Claimed by Algerian Hackers

The National Social Security Fund (CNSS) of Morocco has confirmed that initial checks on...