Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Tomcat | 11.0.0-M1 ~ 11.0.2 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813) | https://github.com/iSee857/CVE-2025-24813-PoC | POC Details |
| 2 | CVE-2025-24813_POC | https://github.com/N0c1or/CVE-2025-24813_POC | POC Details |
| 3 | Security Researcher | https://github.com/gregk4sec/CVE-2025-24813 | POC Details |
| 4 | his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met. | https://github.com/absholi7ly/POC-CVE-2025-24813 | POC Details |
| 5 | cve-2025-24813验证脚本 | https://github.com/FY036/cve-2025-24813_poc | POC Details |
| 6 | CVE-2025-24813利用工具 | https://github.com/charis3306/CVE-2025-24813 | POC Details |
| 7 | CVE-2025-24813 - Apache Tomcat Vulnerability Scanner | https://github.com/issamjr/CVE-2025-24813-Scanner | POC Details |
| 8 | Nuclei Template CVE-2025–24813 | https://github.com/imbas007/CVE-2025-24813-apache-tomcat | POC Details |
| 9 | Apache Tomcat Remote Code Execution (RCE) Exploit - CVE-2025-24813 | https://github.com/msadeghkarimi/CVE-2025-24813-Exploit | POC Details |
| 10 | None | https://github.com/naikordian/CVE-2025-24813 | POC Details |
| 11 | Apache Tomcat Vulnerability POC (CVE-2025-24813) | https://github.com/michael-david-fry/Apache-Tomcat-Vulnerability-POC-CVE-2025-24813 | POC Details |
| 12 | Resources for teh Apache Tomcat CVE lab | https://github.com/ps-interactive/lab-cve-2025-24813 | POC Details |
| 13 | POC for CVE-2025-24813 using Spring-Boot | https://github.com/n0n-zer0/Spring-Boot-Tomcat-CVE-2025-24813 | POC Details |
| 14 | CVE-2025-24813 Apache Tomcat RCE Proof of Concept (PoC) | https://github.com/Alaatk/CVE-2025-24813-POC | POC Details |
| 15 | None | https://github.com/MuhammadWaseem29/CVE-2025-24813 | POC Details |
| 16 | A PoC for CVE-2025-24813 | https://github.com/tonyarris/CVE-2025-24813-PoC | POC Details |
| 17 | Session Exploit | https://github.com/beyond-devsecops/CVE-2025-24813 | POC Details |
| 18 | A playground to test the RCE exploit for tomcat CVE-2025-24813 | https://github.com/u238/Tomcat-CVE_2025_24813 | POC Details |
| 19 | Create lab for CVE-2025-24813 | https://github.com/AlperenY-cs/CVE-2025-24813 | POC Details |
| 20 | This repository contains a shell script based POC on Apache Tomcat CVE-2025-24813. It allow you to easily test the vulnerability on any version of Apache Tomcat | https://github.com/manjula-aw/CVE-2025-24813 | POC Details |
| 21 | None | https://github.com/B1gN0Se/Tomcat-CVE-2025-24813 | POC Details |
| 22 | simple exp for CVE-2025-24813 | https://github.com/AsaL1n/CVE-2025-24813 | POC Details |
| 23 | CVE-2025-24813-POC JSP Web Shell Uploader | https://github.com/La3B0z/CVE-2025-24813-POC | POC Details |
| 24 | None | https://github.com/Heimd411/CVE-2025-24813-noPoC | POC Details |
| 25 | Hello researchers, I have a checker for the recent vulnerability CVE-2025-24813-checker. | https://github.com/horsehacks/CVE-2025-24813-checker | POC Details |
| 26 | None | https://github.com/GadaLuBau1337/CVE-2025-24813 | POC Details |
| 27 | A simple, easy-to-use POC for CVE-2025-42813 (Apache Tomcat versions below 9.0.99). | https://github.com/f8l124/CVE-2025-24813-POC | POC Details |
| 28 | CVE-2025-24813 poc | https://github.com/Franconyu/Poc_for_CVE-2025-24813 | POC Details |
| 29 | Path Equivalence- 'file.Name' (Internal Dot) leading to Remote Code Execution and/or Information disclosure and/or malicious content added to uploaded files via write enabled Default Servlet in Apache Tomcat. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-24813.yaml | POC Details |
| 30 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Tomcat%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2025-24813.md | POC Details |
| 31 | https://github.com/vulhub/vulhub/blob/master/tomcat/CVE-2025-24813/README.md | POC Details | |
| 32 | None | https://github.com/Mattb709/CVE-2025-24813-PoC-Apache-Tomcat-RCE | POC Details |
| 33 | CVE-2025-24813-Scanner is a Python-based vulnerability scanner that detects Apache Tomcat servers vulnerable to CVE-2025-24813, an arbitrary file upload vulnerability leading to remote code execution (RCE) via insecure PUT method handling and jsessionid exploitation. | https://github.com/Mattb709/CVE-2025-24813-Scanner | POC Details |
| 34 | CVE-2025-24813的vulhub环境的POC脚本 | https://github.com/Erosion2020/CVE-2025-24813-vulhub | POC Details |
| 35 | Proof of Concept (PoC) script for CVE-2025-24813, vulnerability in Apache Tomcat. | https://github.com/hakankarabacak/CVE-2025-24813 | POC Details |
| 36 | Remote Code Execution (RCE) vulnerability in Apache Tomcat. | https://github.com/Eduardo-hardvester/CVE-2025-24813 | POC Details |
| 37 | None | https://github.com/fatkz/CVE-2025-24813 | POC Details |
| 38 | PoC para o CVE-2025-24813 | https://github.com/maliqto/PoC-CVE-2025-24813 | POC Details |
| 39 | Apache Tomcat - Remote Code Execution via Session Deserialization (CVE-2025-24813) | https://github.com/mbanyamer/Apache-Tomcat---Remote-Code-Execution-via-Session-Deserialization-CVE-2025-24813- | POC Details |
| 40 | tomcat CVE-2025-24813 反序列化RCE环境 | https://github.com/x1ongsec/CVE-2025-24813 | POC Details |
| 41 | None | https://github.com/yaleman/cve-2025-24813-poc | POC Details |
| 42 | POC | https://github.com/GongWook/CVE-2025-24813 | POC Details |
| 43 | Proof of Concept for CVE-2025-24813, a Remote Code Execution vulnerability in Apache Tomcat. This PoC exploits unsafe deserialization via crafted session files uploaded through HTTP PUT requests, allowing attackers to execute arbitrary code remotely on vulnerable Tomcat servers. | https://github.com/sentilaso1/CVE-2025-24813-Apache-Tomcat-RCE-PoC | POC Details |
| 44 | A tool that identifies writable web directories in Apache Tomcat via HTTP PUT method [CVE-2025-24813] | https://github.com/x00byte/PutScanner | POC Details |
| 45 | None | https://github.com/uzairhaider502/CVE-2025-24813 | POC Details |
| 46 | Apache Tomcat PUT JSP RCE - CVE-2025-24813 - Exploit & PoC | https://github.com/Shivshantp/CVE-2025-24813 | POC Details |
| 47 | Automated scanner + exploit for CVE-2025-24813 | https://github.com/cyglegit/CVE-2025-24813 | POC Details |
| 48 | Este script explora a vulnerabilidade CVE-2025-24813 em versões específicas do Apache Tomcat, permitindo execução remota de código (RCE) através de um vetor de desserialização Java e abuso do método HTTP PUT para gravação arbitrária de arquivos de sessão. | https://github.com/137f/PoC-CVE-2025-24813 | POC Details |
| 49 | None | https://github.com/thebringerofdeath789/CVE-2025-24813 | POC Details |
| 50 | None | https://github.com/threadpoolx/CVE-2025-24813-Remote-Code-Execution-in-Apache-Tomcat | POC Details |
| 51 | Apache (CVE-2025-24813) GOExploiter Checker & Exploiter very Fast | https://github.com/drcrypterdotru/Apache-GOExploiter | POC Details |
| 52 | 🛠 Exploit vulnerable Apache Tomcat servers by scanning for CVE-2025-24813 and uploading files with this Go-based toolkit. | https://github.com/Olabanji10/Apache-GOExploiter | POC Details |
| 53 | This is a PoC for the CVE-2025-24813 and tested in different environments. | https://github.com/CEAlbez/CVE-2025-24813-PoC | POC Details |
| 54 | Este repositorio contiene un exploit automatizado desarrollado con fines educativos y de investigación en ciberseguridad, dirigido a demostrar una potencial vulnerabilidad de ejecución remota de código (RCE) en Apache Tomcat (CVE-2025-24813). | https://github.com/Makavellik/POC-CVE-2025-24813-Apache-Tomcat-Remote-Code-Execution | POC Details |
| 55 | Example PoC for CVE-2025-24813 (Tomcat RCE) | https://github.com/brs6412/CVE-2025-24813 | POC Details |
| 56 | Remote Code Execution (RCE) vulnerability in Apache Tomcat. | https://github.com/ThHardvester/CVE-2025-24813 | POC Details |
| 57 | Example PoC for CVE-2025-24813 (Tomcat RCE) | https://github.com/pirenga/CVE-2025-24813 | POC Details |
| 58 | cve-2025-24813验证脚本 | https://github.com/qzy0x/cve-2025-24813_poc | POC Details |
| 59 | None | https://github.com/Arthurabriel/POC-CVE-2025-24813 | POC Details |
| 60 | Apache Tomcat Deserialization RCE | https://github.com/gunyakit/CVE-2025-24813-PoC-exploit | POC Details |
| 61 | Este script explora a vulnerabilidade CVE-2025-24813 em versões específicas do Apache Tomcat, permitindo execução remota de código (RCE) através de um vetor de desserialização Java e abuso do método HTTP PUT para gravação arbitrária de arquivos de sessão. | https://github.com/ftz7/PoC-CVE-2025-24813 | POC Details |
| 62 | Instructions for rapid deployment of Tomcat v9.0.90 with java 25.0.1 2025-10-21 LTS on Windows Server 2019 Standard for lazy researchers. | https://github.com/seahcy/CVE-2025-24813 | POC Details |
| 63 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Tomcat%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2025-24813.md | POC Details |
| 64 | TomcatScanner is a comprehensive security tool designed for detecting and exploiting the CVE-2025-24813 vulnerability in Apache Tomcat servers. | https://github.com/cchopin/CVE-Arsenal-Lab | POC Details |
No public POC found.
Login to generate AI POCNo comments yet