Apache Struts vulnerabilities

90 known vulnerabilities affecting apache/struts.

Total CVEs
90
CISA KEV
8
actively exploited
Public exploits
35
Exploited in wild
10
Severity breakdown
CRITICAL22HIGH32MEDIUM35LOW1

Vulnerabilities

Page 1 of 5
CVE-2025-68493HIGHCVSS 8.1≥ 2.0.0, ≤ 2.3.37≥ 2.5.0, ≤ 2.5.33+1 more2026-01-11
CVE-2025-68493 [HIGH] CWE-611 CVE-2025-68493: Missing XML Validation vulnerability in Apache Struts, Apache Struts. This issue affects Apache Str Missing XML Validation vulnerability in Apache Struts, Apache Struts. This issue affects Apache Struts: from 2.0.0 before 2.2.1; Apache Struts: from 2.2.1 through 6.1.0. Users are recommended to upgrade to version 6.1.1, which fixes the issue.
nvd
CVE-2025-66675HIGHCVSS 8.2≥ 2.0.0, ≤ 2.3.37≥ 2.5.0, ≤ 2.5.33+2 more2025-12-10
CVE-2025-66675 [HIGH] CVE-2025-66675: Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes d Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion. This issue affects Apache Struts: from 2.0.0 through 6.7.4, from 7.0.0 through 7.0.3. Users are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue. It's related to https://cve.org/CVERecord?id=CVE-2025-64775 - this CVE ad
nvd
CVE-2025-64775HIGHCVSS 7.5≥ 2.0.0, < 6.8.0≥ 7.0.0, < 7.1.12025-12-01
CVE-2025-64775 [HIGH] CWE-459 CVE-2025-64775: Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes d Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion. This issue affects Apache Struts: from 2.0.0 through 6.7.0, from 7.0.0 through 7.0.3. Users are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue.
nvd
CVE-2024-53677CRITICALCVSS 9.5≥ 2.0.0, < 6.4.02024-12-11
CVE-2024-53677 [CRITICAL] CWE-434 CVE-2024-53677: File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enabl File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. This issue affects Apache Struts: from 2.0.0 before 6.4.0. Users are recommended to upgrade to version 6
nvd
CVE-2023-50164CRITICALCVSS 9.8Exploited≥ 2.0.0, < 2.5.33≥ 6.0.0, < 6.3.0.22023-12-07
CVE-2023-50164 [CRITICAL] CWE-552 CVE-2023-50164: An attacker can manipulate file upload params to enable paths traversal and under some circumstances An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
nvd
CVE-2023-41835HIGHCVSS 7.5≥ 2.0.0, < 2.5.32≥ 6.1.2.1, < 6.3.0.12023-12-05
CVE-2023-41835 [HIGH] CWE-459 CVE-2023-41835: When a Multipart request is performed but some of the fields exceed the maxStringLength  limit, the When a Multipart request is performed but some of the fields exceed the maxStringLength limit, the upload files will remain in struts.multipart.saveDir even if the request has been denied. Users are recommended to upgrade to versions Struts 2.5.32 or 6.1.2.2 or Struts 6.3.0.1 or greater, which fixe this issue.
nvd
CVE-2023-34396HIGHCVSS 7.5fixed in 2.5.31≥ 6.0.0, < 6.1.2.12023-06-14
CVE-2023-34396 [MEDIUM] CWE-770 CVE-2023-34396: Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apa Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2. Upgrade to Struts 2.5.31 or 6.1.2.1 or greater
nvd
CVE-2023-34149MEDIUMCVSS 6.5fixed in 2.5.31≥ 6.0.0, < 6.1.2.12023-06-14
CVE-2023-34149 [MEDIUM] CWE-770 CVE-2023-34149: Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apa Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2. Upgrade to Struts 2.5.31 or 6.1.2.1 or greater.
nvd
CVE-2021-31805CRITICALCVSS 9.8PoC≥ 2.0.0, ≤ 2.5.292022-04-12
CVE-2021-31805 [CRITICAL] CVE-2021-31805: The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
nvd
CVE-2020-26258HIGHCVSS 7.7PoCfixed in 6.0.02020-12-16
CVE-2020-26258 [MEDIUM] CWE-918 CVE-2020-26258: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4. XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream.
nvd
CVE-2020-26259MEDIUMCVSS 6.8fixed in 6.0.02020-12-16
CVE-2020-26259 [MEDIUM] CWE-78 CVE-2020-26259: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4. XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrary know files on the host as log as the executing process has sufficient rights only by manipulating th
nvd
CVE-2020-17530CRITICALCVSS 9.8KEVPoC≥ 2.0.0, < 2.5.302020-12-11
CVE-2020-17530 [CRITICAL] CWE-917 CVE-2020-17530: Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
nvd
CVE-2019-0230CRITICALCVSS 9.8PoC≥ 2.0.0, ≤ 2.5.202020-09-14
CVE-2019-0230 [CRITICAL] CWE-1321 CVE-2019-0230: Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
nvd
CVE-2019-0233HIGHCVSS 7.5≥ 2.0.0, ≤ 2.5.202020-09-14
CVE-2019-0233 [HIGH] CWE-281 CVE-2019-0233: An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when pe An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload.
nvd
CVE-2015-2992MEDIUMCVSS 6.1≥ 2.0.0, < 2.3.202020-02-27
CVE-2015-2992 [MEDIUM] CWE-79 CVE-2015-2992: Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability. Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability.
nvd
CVE-2012-1592HIGHCVSS 8.8PoCv2.0.02019-12-05
CVE-2012-1592 [HIGH] CWE-434 CVE-2012-1592: A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which co A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.
nvd
CVE-2011-3923CRITICALCVSS 9.8PoC≥ 2.0.0, < 2.3.1.2v2.3.1.22019-11-01
CVE-2011-3923 [CRITICAL] CWE-732 CVE-2011-3923: Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the Parameter Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
cvelistv5nvd
CVE-2018-11776HIGHCVSS 8.1KEVPoC≥ 2.0.4, < 2.3.35≥ 2.5.0, < 2.5.172018-08-22
CVE-2018-11776 [HIGH] CVE-2018-11776: Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution wh Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag w
nvd
CVE-2018-1327HIGHCVSS 7.5≥ 2.1.1, ≤ 2.5.14.12018-03-27
CVE-2018-1327 [HIGH] CVE-2018-1327: The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS a The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option
nvd
CVE-2017-15707MEDIUMCVSS 6.2≥ 2.5, ≤ 2.5.142017-12-01
CVE-2017-15707 [MEDIUM] CWE-20 CVE-2017-15707: In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulne In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
nvd