Vulnerability Management, Patch/Configuration Management

Attacks Exploiting Critical Apache Tomcat Flaw Under Way

Homepage of Apache website on the display of PC

Threat actors have been leveraging the critical Apache Tomcat vulnerability, tracked as CVE-2025-24813, in ongoing intrusions, SC Media reports.

Exploiting the flaw, which stems from the server platform's PUT request processing mechanism, could enable evasion of security protections, execution of malicious commands, and total hijacking of targeted servers, according to an analysis from Wallarm.

Malicious JSP file uploads, configuration changes, and backdoor injections could also be eventually performed by attackers abusing the flaw.

"This attack is dead simple to execute and requires no authentication," said Wallarm researchers. "The only requirement is that Tomcat is using file-based session storage, which is common in many deployments. Worse, base64 encoding allows the exploit to bypass most traditional security filters, making detection challenging."

Immediate updates to Apache Tomcat versions 11.0.3, 10.1.35, or 9.0.98 have been urged to address the security bug, which researchers regarded as indicative of a more significant issue within the platform.

You can skip this ad in 5 seconds

Cookies

This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.