A new remote code execution (RCE) vulnerability found in Apache Tomcat servers, tracked as CVE-2025-24813, is being exploited in the wild. A Proof of Concept (POC) was released earlier and it’s likely given the volume of activity and pervasive use. Attackers will attempt mass exploitation.
Exploitation can occur through a malformed PUT request to the API when the following conditions are met:
- Writes enabled for the default servlet (readonly=”false”) – (disabled by default).
- Support for partial PUT (enabled by default).
- A target URL for security sensitive uploads that is a sub-directory of a target URL for public uploads.
- Attacker knowledge of the names of security sensitive files being uploaded.
- The security sensitive files are also being uploaded via partial PUT.
Multiple sources have confirmed that this vulnerability is being actively exploited in the wild, utilizing a POC that was posted 2025-03-17.
Patched versions are available, and it is recommended to immediately download and patch the affected servers utilizing Apache Tomcat. Due to active exploitation of these vulnerabilities, the CyberMaxx team recommends a full compromise assessment.
CyberMaxx is monitoring the situation and will provide updates and remediation guidelines as they become available over the coming days.
References: