U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2025-24813

Change History

Initial Analysis by NIST 3/18/2025 1:19:03 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-502
Added CWE

								
							
							
						
CWE-706
Added CPE Configuration

								
							
							
						
OR
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone1:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone10:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone11:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone12:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone13:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone14:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone16:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone2:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone3:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone4:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone5:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone6:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone7:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone8:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone9:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 9.0.1 up to (excluding) 9.0.99
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone15:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone17:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone18:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone19:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:10.1.0:milestone20:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 10.1.1 up to (excluding) 10.1.35
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone10:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone11:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone12:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone13:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone14:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone15:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone16:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone17:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone18:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone19:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone20:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone21:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone22:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone23:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone24:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone25:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone6:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone7:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone8:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:11.0.0:milestone9:*:*:*:*:*:*
          *cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from (including) 11.0.1 up to (excluding) 11.0.3
Added Reference Type

								
							
							
						
Apache Software Foundation: https://lists.apache.org/thread/j5fkjv2k477os90nczf2v9l61fb0kkgq Types: Vendor Advisory
Added Reference Type

								
							
							
						
CISA-ADP: https://github.com/absholi7ly/POC-CVE-2025-24813/blob/main/README.md Types: Exploit
Added Reference Type

								
							
							
						
CVE: http://www.openwall.com/lists/oss-security/2025/03/10/5 Types: Mailing List, Third Party Advisory