CVE-2025-24813: CWE-44 Path Equivalence: 'file.name' (Internal Dot) in Apache Software Foundation Apache Tomcat
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
AI Analysis
Technical Summary
CVE-2025-24813 is a critical vulnerability in Apache Tomcat stemming from a path equivalence issue involving internal dots in file names ('file.name'). This flaw affects Apache Tomcat versions from 8.5.0 through 11.0.2 and allows attackers to perform remote code execution (RCE), information disclosure, or inject malicious content into uploaded files via the default servlet when certain conditions are met. The vulnerability arises when the default servlet has write permissions enabled (which is disabled by default) and supports partial PUT requests (enabled by default). An attacker can exploit this by targeting URLs where security-sensitive files are uploaded as subdirectories of public upload directories, combined with knowledge of file names and partial PUT support. For RCE, the application must use Tomcat's file-based session persistence with the default storage location and include a library vulnerable to deserialization attacks. The vulnerability leverages CWE-44 (Path Equivalence) and CWE-502 (Deserialization of Untrusted Data), enabling attackers to bypass security controls by manipulating file paths with internal dots, leading to unauthorized file access or code execution. The CVSS v3.1 score is 10.0 (critical), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability with scope change. No known exploits are currently reported in the wild, but the severity demands urgent attention. The recommended mitigation is upgrading to Apache Tomcat versions 11.0.3, 10.1.35, or 9.0.99, which address the issue.
Potential Impact
For European organizations, the impact of CVE-2025-24813 is severe. Exploitation can lead to full remote code execution on affected servers, allowing attackers to take control of web applications, steal sensitive data, manipulate or delete files, and disrupt services. Information disclosure risks expose confidential business or personal data, potentially violating GDPR and other data protection regulations, leading to legal and financial consequences. Organizations using default servlet write permissions and partial PUT support in Tomcat are particularly vulnerable, especially those relying on file-based session persistence and vulnerable deserialization libraries. Critical sectors such as finance, healthcare, government, and telecommunications that rely heavily on Java-based web applications and Tomcat servers face heightened risks. The ability to execute code remotely without authentication or user interaction increases the likelihood of automated exploitation and widespread compromise. This vulnerability could facilitate ransomware deployment, espionage, or sabotage, impacting availability and trust in digital services across Europe.
Mitigation Recommendations
1. Immediately upgrade Apache Tomcat to versions 11.0.3, 10.1.35, or 9.0.99, which contain patches for this vulnerability. 2. Disable write permissions on the default servlet unless explicitly required; this is disabled by default and should remain so unless necessary. 3. Disable or restrict support for partial PUT requests if not needed, as this feature is enabled by default and is a key enabler of the exploit. 4. Review and harden file upload directories to ensure security-sensitive files are not stored in subdirectories accessible via public upload URLs. 5. Avoid using file-based session persistence with default storage locations; consider alternative session management strategies. 6. Audit and update all third-party libraries to eliminate deserialization vulnerabilities that could be chained with this exploit. 7. Implement strict access controls and monitoring on upload endpoints to detect anomalous PUT requests or unusual file modifications. 8. Conduct thorough code reviews and penetration testing focusing on file upload and session persistence mechanisms. 9. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious path traversal or partial PUT requests. 10. Maintain an incident response plan to quickly address any exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden, Belgium, Austria
CVE-2025-24813: CWE-44 Path Equivalence: 'file.name' (Internal Dot) in Apache Software Foundation Apache Tomcat
Description
Path Equivalence: 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, from 9.0.0.M1 through 9.0.98. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. If all of the following were true, a malicious user was able to view security sensitive files and/or inject content into those files: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - a target URL for security sensitive uploads that was a sub-directory of a target URL for public uploads - attacker knowledge of the names of security sensitive files being uploaded - the security sensitive files also being uploaded via partial PUT If all of the following were true, a malicious user was able to perform remote code execution: - writes enabled for the default servlet (disabled by default) - support for partial PUT (enabled by default) - application was using Tomcat's file based session persistence with the default storage location - application included a library that may be leveraged in a deserialization attack Users are recommended to upgrade to version 11.0.3, 10.1.35 or 9.0.99, which fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-24813 is a critical vulnerability in Apache Tomcat stemming from a path equivalence issue involving internal dots in file names ('file.name'). This flaw affects Apache Tomcat versions from 8.5.0 through 11.0.2 and allows attackers to perform remote code execution (RCE), information disclosure, or inject malicious content into uploaded files via the default servlet when certain conditions are met. The vulnerability arises when the default servlet has write permissions enabled (which is disabled by default) and supports partial PUT requests (enabled by default). An attacker can exploit this by targeting URLs where security-sensitive files are uploaded as subdirectories of public upload directories, combined with knowledge of file names and partial PUT support. For RCE, the application must use Tomcat's file-based session persistence with the default storage location and include a library vulnerable to deserialization attacks. The vulnerability leverages CWE-44 (Path Equivalence) and CWE-502 (Deserialization of Untrusted Data), enabling attackers to bypass security controls by manipulating file paths with internal dots, leading to unauthorized file access or code execution. The CVSS v3.1 score is 10.0 (critical), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and impacts on confidentiality, integrity, and availability with scope change. No known exploits are currently reported in the wild, but the severity demands urgent attention. The recommended mitigation is upgrading to Apache Tomcat versions 11.0.3, 10.1.35, or 9.0.99, which address the issue.
Potential Impact
For European organizations, the impact of CVE-2025-24813 is severe. Exploitation can lead to full remote code execution on affected servers, allowing attackers to take control of web applications, steal sensitive data, manipulate or delete files, and disrupt services. Information disclosure risks expose confidential business or personal data, potentially violating GDPR and other data protection regulations, leading to legal and financial consequences. Organizations using default servlet write permissions and partial PUT support in Tomcat are particularly vulnerable, especially those relying on file-based session persistence and vulnerable deserialization libraries. Critical sectors such as finance, healthcare, government, and telecommunications that rely heavily on Java-based web applications and Tomcat servers face heightened risks. The ability to execute code remotely without authentication or user interaction increases the likelihood of automated exploitation and widespread compromise. This vulnerability could facilitate ransomware deployment, espionage, or sabotage, impacting availability and trust in digital services across Europe.
Mitigation Recommendations
1. Immediately upgrade Apache Tomcat to versions 11.0.3, 10.1.35, or 9.0.99, which contain patches for this vulnerability. 2. Disable write permissions on the default servlet unless explicitly required; this is disabled by default and should remain so unless necessary. 3. Disable or restrict support for partial PUT requests if not needed, as this feature is enabled by default and is a key enabler of the exploit. 4. Review and harden file upload directories to ensure security-sensitive files are not stored in subdirectories accessible via public upload URLs. 5. Avoid using file-based session persistence with default storage locations; consider alternative session management strategies. 6. Audit and update all third-party libraries to eliminate deserialization vulnerabilities that could be chained with this exploit. 7. Implement strict access controls and monitoring on upload endpoints to detect anomalous PUT requests or unusual file modifications. 8. Conduct thorough code reviews and penetration testing focusing on file upload and session persistence mechanisms. 9. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious path traversal or partial PUT requests. 10. Maintain an incident response plan to quickly address any exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2025-01-24T08:51:50.296Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 687e795da83201eaac11f328
Added to database: 7/21/2025, 5:31:09 PM
Last enriched: 10/29/2025, 12:27:27 PM
Last updated: 12/11/2025, 6:24:00 AM
Views: 99
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.