Skip to main content Skip to local navigation

Apache Tomcat (CVE-2025-24813)

 

A picture containing text  Description automatically generated

 

Service Advisory 

 

A newly discovered Apache Tomcat vulnerability (CVE-2025-4577) is actively being exploited in the wild, enabling attackers to take over servers with a simple PUT request.

 

Severity level

CVSS Score: 8.6/High

 

Description:

Under certain conditions and configurations, this vulnerability could allow a malicious actor to view or inject arbitrary content to security-sensitive files or achieve remote code execution. The exploit does not require authentication and is caused by Tomcat accepting partial PUT requests and its default session persistence.

 

Affected Versions: 

Apache Tomcat versions earlier 11.0.0-M1 to 11.0.2

Apache Tomcat versions earlier 10.1.0-M1 to 10.1.34

Apache Tomcat versions earlier 9.0.0-M1 to 9.0.98

 

Impact:

Successfully exploitation could permit a malicious user to view security sensitive files or inject arbitrary content.

 

Resolution:

Update the Apache Tomcat server.

 

Reference:

https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq

https://www.cyber.gc.ca/en/alerts-advisories/vulnerability-impacting-apache-tomcat-cve-2025-24813

https://nvd.nist.gov/vuln/detail/CVE-2025-24813

https://access.redhat.com/security/cve/cve-2025-24813

https://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/

UIT Information Security

Contact

IT Client Services at askIT@yorku.ca or 416 736 5800

 

PRIVACY POLICY | VISIT WWW.YORKU.CA
This email was sent by: York University, 4700 Keele Street, Toronto, Ontario M3J 1P3

This email is viewed best in Microsoft Outlook for web