A worrying critical security flaw in Apache Tomcat could let hackers take over servers with ease




  • Security outfit Wallarm spotted a PoC in the wild
  • The method abuses a deserialization flaw in Apache Tomcat
  • It allows attackers to fully take over vulnerable endpoints

A deserialization vulnerability on Apache Tomcat servers is being abused in the wild to completely take over affected endpoints, security researchers are warning.

Wallarm has revealed it saw a Chinese forum user, alias iSee857, share a proof-of-concept (PoC) for a flaw tracked as CVE-2025-24813, warning threat actors only need one PUT API request to take over the vulnerable server. The request is used to upload a malicious serialized Java session, which then allows the attacker to trigger deserialization by referencing the malicious session ID in a GET request.

https://cdn.mos.cms.futurecdn.net/V5UoHpQhbFJU2bGSSKCRYM-1200-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img