A worrying critical security flaw in Apache Tomcat could let hackers take over servers with ease
Researchers have spotted an Apache Tomcat PoC in the wild

- Security outfit Wallarm spotted a PoC in the wild
- The method abuses a deserialization flaw in Apache Tomcat
- It allows attackers to fully take over vulnerable endpoints
A deserialization vulnerability on Apache Tomcat servers is being abused in the wild to completely take over affected endpoints, security researchers are warning.
Wallarm has revealed it saw a Chinese forum user, alias iSee857, share a proof-of-concept (PoC) for a flaw tracked as CVE-2025-24813, warning threat actors only need one PUT API request to take over the vulnerable server. The request is used to upload a malicious serialized Java session, which then allows the attacker to trigger deserialization by referencing the malicious session ID in a GET request.
“Tomcat, seeing this session ID, retrieves the stored file, deserializes it, and executes the embedded Java code, granting full remote access to the attacker,” Wallarm explained.
Dead simple
The researchers added that the attack is “dead simple” to execute, and requires no authentication. The only requirement is that Tomcat is using file-based session storage which, according to the researchers, is “common in many deployments”. Furthermore, base64 encoding means the attack will bypass most traditional security filters.
Most web application firewalls (WAF) “completely miss” this attack, Wallarm further warned, since the PUT request looks normal, the payload is base64-encoded, the attack is two-step, where the harmful only happens in the second step, and since most WAFs don’t deeply inspect uploaded files.
“This means that by the time an organization detects the breach in its logs, it’s already too late.”
The worst part, Wallarm concluded, is that “this is just the first wave,” as it expects threat actors to start uploading malicious JSP files, modifying configurations, and planting backdoors outside session storage.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
It was not yet assigned a severity score, and as per the NVD, it affects Apache Tomcat from 11.0.0-M1 through 11.0.2, from 10.1.0-M1 through 10.1.34, and from 9.0.0.M1 through 9.0.98.
Users are advised to upgrade to version 11.0.3, 10.1.35 or 9.0.98, which fixes the issue.
You might also like
- These vulnerabilities in Apache HTTP Server enable HTTP Request Smuggling and SSL Authentication Bypass
- We've rounded up the best password managers
- Take a look at our guide to the best authenticator app
Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.

















