CVE CVE

CVE-2025-24813

CISA Known Exploited Vulnerability (KEV)

Apache Tomcat Path Equivalence Vulnerability

April 1, 2025

April 22, 2025

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Description

Path Equivalence: ‘file.Name’ (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98.

If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files:
– writes enabled for the default servlet (disabled by default)
– support for partial PUT (enabled by default)
– a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads
– attacker knowledge of the names of security sensitive files being uploaded
– the security sensitive files also being uploaded via partial PUT

If all of the following were true, a malicious user was able to perform remote code execution:
– writes enabled for the default servlet (disabled by default)
– support for partial PUT (enabled by default)
– application was using Tomcat’s file based session persistence with the default storage location
– application included a library that may be leveraged in a deserialization attack

Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.

Weakness Enumeration

CWE-ID CWE Name

CWE-44
Path Equivalence: ‘file.name’ (Internal Dot)

CWE-502
Deserialization of Untrusted Data

Known Affected Software Configurations


cpe:2.3:a:apache:tomcat:10.1.27:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.94:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.92:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone18:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.96:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.34:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.33:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.89:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.26:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.93:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone19:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.23:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.30:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone22:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.22:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:-:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.87:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone13:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.84:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.90:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.88:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone25:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone17:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.95:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.25:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone16:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.29:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone20:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.32:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.31:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.86:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.85:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.98:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone23:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone12:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone21:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.91:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.97:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone24:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone15:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.35:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.99:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.28:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone14:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:8.5.95:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.82:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.83:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:8.5.96:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.71:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.70:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.81:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:8.5.94:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:8.5.93:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:8.5.90:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:8.5.91:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:8.5.92:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.76:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.78:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.79:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.80:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.77:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.0:-:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.0:milestone18:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.0:milestone19:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.0:milestone20:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:8.5.85:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:8.5.89:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:8.5.84:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:8.5.87:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:8.5.88:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.75:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.73:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:9.0.74:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.1.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:10.0.25:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*

Details

Source:
NVD
Published:
Updated:

Risk information

CVSS v3

Base score:
9.8
Severity:

CRITICAL

Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v2

Not defined