CVE-2025-24813 affecting Apache Tomcat

Our advisories highlight current cyber security threats and vulnerabilities in New Zealand, and provide guidance on how to mitigate their impact.

Subscribe to our updates to be notified as soon as we publish an advisory.

4:30pm, 18 March 2025

TLP Rating: Clear

CVE-2025-24813 affecting Apache Tomcat

CVE-2025-24813 could allow an unauthenticated attacker to upload a malicious serialised payload to a Tomcat server, leading to arbitrary code execution when certain conditions are met. 

An upgrade to the latest version is available.

What's happening

Systems affected

Apache Tomcat versions:
•    11.0.0-M1 – 11.0.2
•    10.1.0-M1 – 10.1.34 
•    9.0.0.M1 – 9.0.98

Applications that use the affected Apache Tomcat versions must also meet several conditions for an attacker to view the security sensitive files or inject content into those files. A separate list of conditions must be met for an attacker to gain RCE.

What this means

Listed Apache Tomcat versions with additional conditions met are vulnerable. 

The NCSC is aware of a proof of concept (PoC) and open-source reporting of active exploitation of CVE-2025-24813.

What to look for

How to tell if you're at risk

If you are running an Apache Tomcat server within the listed versions and your installation also meets the additional conditions listed in the vendor advisory.

What to do

Prevention

•    Upgrade to Apache Tomcat 11.0.3 or later
•    Upgrade to Apache Tomcat 10.1.35 or later
•    Upgrade to Apache Tomcat 9.0.99 or later

More information

Apache advisory:

[SECURITY] CVE-2025-24813 Potential RCE and/or information disclosure and/or information corruption with partial PUT-Apache Mail Archives External Link

If you require more information or further support, submit a report on our website or contact us on 0800 CERTNZ.

Report an incident to CERT NZ External Link

For media enquiries, email our media desk at media@ncsc.govt.nz or call the media team on 021 854.