{"id":31415,"date":"2025-03-25T07:03:09","date_gmt":"2025-03-25T07:03:09","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=31415"},"modified":"2026-04-17T18:07:36","modified_gmt":"2026-04-17T18:07:36","slug":"disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/","title":{"rendered":"Disposal Advisory for Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813)"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Vulnerability Overview<\/h2>\n\n\n\n<p><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/?p=31372\">Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813)<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">NSFOCUS Detection Methods<\/h2>\n\n\n\n<p>NSFOCUS Remote Security Assessment System (RSAS), Web Vulnerability Scanning System (WVSS) and Network Intrusion Detection System (IDS) have the ability to scan and detect this vulnerability. Users who deploy the above devices are requested to upgrade to the latest version.<\/p>\n\n\n\n<p>Upgrade site: <a href=\"https:\/\/update.nsfocusglobal.com\/update\/listRsas\">NSFOCUS_Product&Acirc;&nbsp;Support&Acirc;&nbsp;Service_Product&Acirc;&nbsp;Upgrade&Acirc;&nbsp;<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Risk Screening of Exposure Surface<\/h2>\n\n\n\n<p>NSFOCUS <a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/04\/NSFOCUS-EASM-Datasheet0428.pdf\">External Attack Surface Management<\/a> (EASM) supports the Internet asset investigation of CVE-2025-24813 vulnerability risks. It has helped service customers complete exposure surface investigation and risk verification, and timely conduct vulnerability early warning and closed-loop disposal before threats occur. Interested customers can <a href=\"https:\/\/nsfocusglobal.com\/pt-br\/contact-us\/\">contact NSFOCUS<\/a>&#8216;s local regional team or send an email to rs@nsfocus.com for detailed consultation.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Local Risk Screnning<\/h2>\n\n\n\n<p><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/continuous-threat-exposure-management\/\">NSFOCUS CTEM<\/a> solution can actively and passively discover and troubleshoot Tomcat-related assets. The user uses the external attack surface discovery function to synchronize CVE-2025-24813 vulnerability clues to the cloud, and obtain the affected assets of the target unit by asset mapping. CTEM accesses the product fingerprint database of EASM, and supports searching for ports and fingerprint information of assets. User can directly match assets through the type and version of middleware in the asset list, constrcut mapping by fingerprint identification or PoC scanning. CTEM supports port scanning and the calling of various scanning devices. The internal version of NSFOCUS EZ also supports Tomcat&#8217;s service identification and CVE-2025-24813 vulnerability risk detection, which can be directly scanned by the web module. (Note: please contact NSFOCUS sales personnel for the internal version) <\/p>\n\n\n\n<p>Download link of the tool: <a href=\"https:\/\/github.com\/m-sec-org\/EZ\/releases\">https:\/\/github.com\/m-sec-org\/EZ\/releases<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation by NSFOCUS Products<\/h2>\n\n\n\n<p>NSFOCUS <a href=\"\/?page_id=4448\">Web Application Protection System<\/a> (WAF) supports protection against historical general rules. The <a href=\"https:\/\/nsfocusglobal.com\/pt-br\/products\/next-generation-intrusion-prevention-ngips\/\">Intrusion Prevention System<\/a> (IPS) and NSFOCUS <a href=\"\/?page_id=13602\">Intelligent Security Operations Platform<\/a> (ISOP) have released rule upgrade packages. Please update the rule package to the latest version to form security product protection and monitoring capabilities. <\/p>\n\n\n\n<p><strong><a href=\"https:\/\/update.nsfocusglobal.com\/update\/wafIndex\">NSFOCUS WAF (Hardware)(WAF) Upgrade List<\/a><\/strong><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/update.nsfocusglobal.com\/update\/listIps\">NSFOCUS NIPS(Hardware)(IPS) Upgrade List<\/a><\/strong><\/p>\n\n\n\n<p><strong><a href=\"https:\/\/nsfocusglobal.com\/pt-br\/customer-portal\/isop-cp\/\">NSFOCUS ISOP Upgrade<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About NSFOCUS<\/h2>\n\n\n\n<p>NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.<\/p>\n\n\n\n<p>Founded in 2000, NSFOCUS operates globally with over 4000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world&acirc;&euro;&trade;s top ten telecommunications companies.<\/p>\n\n\n\n<p>Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Overview Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) NSFOCUS Detection Methods NSFOCUS Remote Security Assessment System (RSAS), Web Vulnerability Scanning System (WVSS) and Network Intrusion Detection System (IDS) have the ability to scan and detect this vulnerability. Users who deploy the above devices are requested to upgrade to the latest version. Upgrade site: NSFOCUS_Product&Acirc;&nbsp;Support&Acirc;&nbsp;Service_Product&Acirc;&nbsp;Upgrade&Acirc;&nbsp; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":8544,"comment_status":"open","ping_status":"open","sticky":false,"template":"post-templates\/single-layout-8.php","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[72,82,84,938,610],"class_list":["post-31415","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response","tag-apache","tag-apache-tomcat","tag-apache-vulnerability","tag-cve-2025-24813","tag-remote-code-execution"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Disposal Advisory for Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Disposal Advisory for Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Overview Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) NSFOCUS Detection Methods NSFOCUS Remote Security Assessment\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-25T07:03:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/apachetomcat.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Disposal Advisory for Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Overview Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) NSFOCUS Detection Methods NSFOCUS Remote Security Assessment\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/apachetomcat.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Disposal Advisory for Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813)\",\"datePublished\":\"2025-03-25T07:03:09+00:00\",\"dateModified\":\"2026-04-17T18:07:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\\\/\"},\"wordCount\":592,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/apachetomcat.jpg\",\"keywords\":[\"Apache\",\"Apache Tomcat\",\"Apache Vulnerability\",\"CVE-2025-24813\",\"Remote code execution\"],\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\\\/\",\"name\":\"Disposal Advisory for Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/apachetomcat.jpg\",\"datePublished\":\"2025-03-25T07:03:09+00:00\",\"dateModified\":\"2026-04-17T18:07:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/apachetomcat.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/apachetomcat.jpg\",\"width\":553,\"height\":264,\"caption\":\"Apache Tomcat logo with feather icon.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Disposal Advisory for Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Disposal Advisory for Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Disposal Advisory for Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) - NSFOCUS","og_description":"Vulnerability Overview Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) NSFOCUS Detection Methods NSFOCUS Remote Security Assessment","og_url":"https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/","og_site_name":"NSFOCUS","article_published_time":"2025-03-25T07:03:09+00:00","article_modified_time":"2026-04-17T18:07:36+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/apachetomcat.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"Disposal Advisory for Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) - NSFOCUS","twitter_description":"Vulnerability Overview Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) NSFOCUS Detection Methods NSFOCUS Remote Security Assessment","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/apachetomcat.jpg","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Disposal Advisory for Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813)","datePublished":"2025-03-25T07:03:09+00:00","dateModified":"2026-04-17T18:07:36+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/"},"wordCount":592,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/apachetomcat.jpg","keywords":["Apache","Apache Tomcat","Apache Vulnerability","CVE-2025-24813","Remote code execution"],"articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/","url":"https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/","name":"Disposal Advisory for Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813) - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/apachetomcat.jpg","datePublished":"2025-03-25T07:03:09+00:00","dateModified":"2026-04-17T18:07:36+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/apachetomcat.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/04\/apachetomcat.jpg","width":553,"height":264,"caption":"Apache Tomcat logo with feather icon."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/disposal-advisory-for-apache-tomcat-remote-code-execution-vulnerability-cve-2025-24813\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Disposal Advisory for Apache Tomcat Remote Code Execution Vulnerability (CVE-2025-24813)"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/31415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=31415"}],"version-history":[{"count":1,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/31415\/revisions"}],"predecessor-version":[{"id":35472,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/31415\/revisions\/35472"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/8544"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=31415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=31415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=31415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}