Apache Software Foundation Apache Struts vulnerabilities
24 known vulnerabilities affecting apache_software_foundation/apache_struts.
Total CVEs
24
CISA KEV
5
actively exploited
Public exploits
7
Exploited in wild
7
Severity breakdown
CRITICAL8HIGH10MEDIUM6
Vulnerabilities
Page 1 of 2
CVE-2025-68493HIGHCVSS 8.1≥ 2.0.0, < 2.2.1≥ 2.2.1, ≤ 6.1.02026-01-11
CVE-2025-68493 [HIGH] CWE-611 CVE-2025-68493: Missing XML Validation vulnerability in Apache Struts, Apache Struts.
This issue affects Apache Str
Missing XML Validation vulnerability in Apache Struts, Apache Struts.
This issue affects Apache Struts: from 2.0.0 before 2.2.1; Apache Struts: from 2.2.1 through 6.1.0.
Users are recommended to upgrade to version 6.1.1, which fixes the issue.
cvelistv5nvd
CVE-2025-66675HIGHCVSS 7.5≥ 2.0.0, ≤ 6.7.*≥ 7.0.0, ≤ 7.0.*2025-12-10
CVE-2025-66675 [HIGH] CWE-459 Apache Struts: File leak in multipart request processing causes disk exhaustion (DoS) - version ranges fixed
Apache Struts: File leak in multipart request processing causes disk exhaustion (DoS) - version ranges fixed
Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion.
This issue affects Apache Struts: from 2.0.0 through 6.7.4, from 7.0.0 through 7.0.3.
Users are recommended to upgrade to version 6.8
cvelistv5
CVE-2025-64775HIGHCVSS 7.5≥ 2.0.0, ≤ 6.7.*≥ 7.0.0, ≤ 7.0.*2025-12-01
CVE-2025-64775 [HIGH] CWE-459 CVE-2025-64775: Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes d
Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion.
This issue affects Apache Struts: from 2.0.0 through 6.7.0, from 7.0.0 through 7.0.3.
Users are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue.
cvelistv5nvd
CVE-2024-53677CRITICALCVSS 9.5≥ 2.0.0, < 6.4.02024-12-11
CVE-2024-53677 [CRITICAL] CWE-434 CVE-2024-53677: File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enabl
File upload logic in Apache Struts is flawed. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
This issue affects Apache Struts: from 2.0.0 before 6.4.0.
Users are recommended to upgrade to version 6
cvelistv5nvd
CVE-2023-50164CRITICALCVSS 9.8Exploited≥ 2.0.0, ≤ 2.5.32≥ 6.0.0, ≤ 6.3.0.12023-12-07
CVE-2023-50164 [CRITICAL] CWE-552 CVE-2023-50164: An attacker can manipulate file upload params to enable paths traversal and under some circumstances
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
cvelistv5nvd
CVE-2023-41835HIGHCVSS 7.5≥ 2.0.0, ≤ 2.5.31≥ 6.1.2.1, ≤ 6.3.02023-12-05
CVE-2023-41835 [HIGH] CWE-459 CVE-2023-41835: When a Multipart request is performed but some of the fields exceed the maxStringLength limit, the
When a Multipart request is performed but some of the fields exceed the maxStringLength limit, the upload files will remain in struts.multipart.saveDir even if the request has been denied.
Users are recommended to upgrade to versions Struts 2.5.32 or 6.1.2.2 or Struts 6.3.0.1 or greater, which fixe this issue.
cvelistv5nvd
CVE-2023-34396HIGHCVSS 7.5≤ 2.5.302023-06-14
CVE-2023-34396 [MEDIUM] CWE-770 CVE-2023-34396: Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apa
Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2.
Upgrade to Struts 2.5.31 or 6.1.2.1 or greater
cvelistv5nvd
CVE-2023-34149MEDIUMCVSS 6.5≤ 2.5.302023-06-14
CVE-2023-34149 [MEDIUM] CWE-770 CVE-2023-34149: Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apa
Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2.
Upgrade to Struts 2.5.31 or 6.1.2.1 or greater.
cvelistv5nvd
CVE-2021-31805CRITICALCVSS 9.8PoCv2.0.0 to 2.5.292022-04-12
CVE-2021-31805 [CRITICAL] CWE-917 Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.
Forced OGNL evaluation, when evaluated on raw not validated user input in tag attributes, may lead to RCE.
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL e
cvelistv5
CVE-2020-17530CRITICALCVSS 9.8KEVPoCv2.0.0 to 2.5.292020-12-11
CVE-2020-17530 [CRITICAL] CWE-917 CVE-2020-17530: Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
cvelistv5nvd
CVE-2015-2992MEDIUMCVSS 6.1vbefore 2.3.202020-02-27
CVE-2015-2992 [MEDIUM] CWE-79 CVE-2015-2992: Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability.
Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability.
cvelistv5nvd
CVE-2018-11776HIGHCVSS 8.1KEVPoCv2.3 to 2.3.34v2.5 to 2.5.162018-08-22
CVE-2018-11776 [HIGH] CVE-2018-11776: Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution wh
Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag w
cvelistv5nvd
CVE-2018-1327HIGHCVSS 7.5vApache Struts 2.1.1 to 2.5.14.12018-03-27
CVE-2018-1327 [HIGH] CVE-2018-1327: The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS a
The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option
cvelistv5nvd
CVE-2017-15707MEDIUMCVSS 6.2v2.5 to 2.5.142017-12-01
CVE-2017-15707 [MEDIUM] CWE-20 CVE-2017-15707: In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulne
In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
cvelistv5nvd
CVE-2016-6795CRITICALCVSS 9.8v2.3.x before 2.3.31v2.5.x before 2.5.52017-09-20
CVE-2016-6795 [CRITICAL] CWE-22 CVE-2016-6795: In the Convention plugin in Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possibl
In the Convention plugin in Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side.
cvelistv5nvd
CVE-2017-12611CRITICALCVSS 9.8ExploitedPoCv2.0.0 - 2.3.33v2.5 - 2.5.10.12017-09-20
CVE-2017-12611 [CRITICAL] CWE-20 CVE-2017-12611: In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in
In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.
cvelistv5nvd
CVE-2017-9793HIGHCVSS 7.5v2.3.7 - 2.3.33v2.5 - 2.5.12+1 more2017-09-20
CVE-2017-9793 [HIGH] CWE-20 CVE-2017-9793: The REST Plugin in Apache Struts 2.1.x, 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outd
The REST Plugin in Apache Struts 2.1.x, 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload.
cvelistv5nvd
CVE-2016-8738MEDIUMCVSS 5.9v2.5 - 2.5.52017-09-20
CVE-2016-8738 [MEDIUM] CWE-20 CVE-2016-8738: In Apache Struts 2.5 through 2.5.5, if an application allows entering a URL in a form field and the
In Apache Struts 2.5 through 2.5.5, if an application allows entering a URL in a form field and the built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL.
cvelistv5nvd
CVE-2017-9804MEDIUMCVSS 5.9v2.3.7 - 2.3.33v2.5 - 2.5.122017-09-20
CVE-2017-9804 [MEDIUM] CVE-2017-9804: In Apache Struts 2
In Apache Struts 2.3.7 through 2.3.33 and 2.5 through 2.5.12, if an application allows entering a URL in a form field and built-in URLValidator is used, it is possible to prepare a special URL which will be used to overload server process when performing validation of the URL. NOTE: this vulnerability exists because of an incomplete fix for S2-047 / CVE-2017-7672.
cvelistv5
CVE-2017-9805HIGHCVSS 8.1KEVPoCvApache Struts before 2.3.34 and 2.5.x before 2.5.132017-09-15
CVE-2017-9805 [HIGH] CWE-502 CVE-2017-9805: The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an X
The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.
cvelistv5nvd
1 / 2Next →