'Dead simple' RCE exploit in Apache Tomcat under attack
- A critical remote code execution vulnerability in Apache Tomcat, tracked as CVE-2025-24813, is under active exploitation and allows attackers to take control of servers with a simple PUT request.
- The vulnerability was disclosed on March 10, and an exploit was publicly shared 30 hours later, according to Wallarm.
- The Apache Foundation classified this flaw as important and recommended users upgrade to patched versions 11.0.3+, 10.1.35+, or 9.0.99+ to mitigate the risks.
- Wallarm noted the potential for more similar vulnerabilities due to the partial PUT handling in Tomcat, stating, 'This attack is dead simple to execute and requires no authentication.
11 Articles
11 Articles


Critical RCE flaw in Apache Tomcat actively exploited in attacks
A critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild, enabling attackers to take over servers with a simple PUT request.


A critical Apache Tomcat RCE flaw is being exploited, letting attackers take over servers via a PUT request; Wallarm: the attack “requires no authentication”
Bill Toulas / BleepingComputer: A critical Apache Tomcat RCE flaw is being exploited, letting attackers take over servers via a PUT request; Wallarm: the attack “requires no authentication” — A critical remote code execution (RCE) vulnerability in Apache Tomcat tracked as CVE-2025-24813 is actively exploited in the wild …
Coverage Details
Bias Distribution
- 100% of the sources are Center
To view factuality data please Upgrade to Premium
Ownership
To view ownership data please Upgrade to Vantage