A recently disclosed security flaw impacting Apache Tomcat is actively exploited in the wild following the release of a public proof-of-concept just thirty hours after public disclosure. CVE-2025-24813 is the (for a short while) attackers new best friend since authentication is not required to pull off an attack
Tomcat is an infrastructure component: its embedded in something else you own and run. As such, it might not be on your radar. After all, you bought and paid for Biggus Software Inc’s software, not open-source patchy tomcats. But, nonetheless, it is there inside, and no SBOM in sight. And, you have no means (usually) of upgrading that middleware, so you are beholding to the top level bundler.
Apache Tomcat is an open-source web server and servlet container developed by the Apache Software Foundation. It’s designed to execute Java servlets, JavaServer Pages (JSPs), and other Java web technologies: a cornerstone for deploying Java-based web applications. Tomcat is embedded in various environments, including:
- Web applications: It serves as the underlying server for numerous web applications, from simple websites to complex enterprise systems.
- Integrated development environments: Developers often use embedded Tomcat instances within IDEs like Eclipse or IntelliJ IDEA for testing and debugging web applications during development.
- Standalone servers: Tomcat can function as a standalone web server, handling HTTP requests and serving web content.
- Within larger Java EE applications: While Tomcat itself is a servlet container, it is also used as a component within larger Java Enterprise Edition (Java EE) application servers, or Jakarta EE application servers.
- Various software products: many software products that require the ability to host web based interfaces will embed Tomcat into their products. This can included embedded products (e.g. cameras, video recorders, etc).

How would an attacker exploit this risk? Would it be the primary way in the door? It could be, there is certainly no shortage of Tomcat servers hanging out on the public Internet. Embedded ones, IT ones, etc. Everyone’s favourite search engine, shodan.io makes it one click away of finding a few non stealthy ones.
Would it be the lateral traversal? E.g. I trick you into doing something, and then go onwards through your Tomcat to bigger better badness?
Would it be some sort of living off the land, the attacker hangs out in the Tomcat server for some time and then resurfaces?
Would it be an attack on the data the Tomcat server mediates? It might have access to your corporate data lake, your payroll system, your quote-to-order, your CRM. Maybe industrial espionage is on the table?
Would it be going after your developers and thus your spot in the supply chain to your customers?
One thing is for sure, since its a deeply embedded component, the specific vulnerability will be with us for years, much like log4j still ricochets around. The “Industrial Supply Chain Matryoshka Risk“.
As always, I recommend “Three Strategies To Help“, based on a solid foundation of Defence in Depth, powered by the best implementation of Zero Trust, Agilicus AnyX. This one is a marathon, not a sprint.