Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix.
https://exchange.xforce.ibmcloud.com/vulnerabilities/90392
http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
http://www.fujitsu.com/global/support/software/security/products-f/interstage-bpm-analytics-201301e.html
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2
http://seclists.org/oss-sec/2014/q1/89
https://veriti.ai/blog/vulnerable-villain-when-hackers-get-hacked/
http://struts.apache.org/release/2.3.x/docs/s2-016.html
http://archiva.apache.org/security.html
Source: Mitre, NVD
Published: 2013-07-20
Updated: 2025-04-11
Known Exploited Vulnerability (KEV)
Base Score: 9.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.94328