CVE-2025-32432Saturday, March 21, 2026

Remote Code Execution in Apache Struts Framework via OGNL Expression Injection

A remote code execution vulnerability exists in Apache Struts versions 2.5.0 through 2.5.30 due to improper validation of OGNL expressions in tag attributes. An unauthenticated attacker can execute arbitrary code on affected systems by submitting specially crafted HTTP requests containing malicious OGNL expressions.

Not KEV Listed✓ Fix Available
Remote Code Execution in Apache Struts Framework via OGNL Expression Injection
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

There is a serious security flaw in a popular web development framework called Apache Struts. The problem allows hackers to take complete control of web servers running vulnerable versions of Struts by sending specially crafted web requests. This is particularly dangerous because attackers don't need any password or special access - they can attack any vulnerable website directly over the internet.

Think of it like a door lock that has a design flaw allowing anyone to unlock it using a special combination, even without the key. In this case, hackers can send specific commands that trick the system into running any code they want, potentially letting them steal data, install malware, or take over the entire server.

Affected Products

1affected product identified
ProductVendorVersionPatched
>StrutsApache2.5.0-2.5.302.5.31
🔧

Remediation

Fix Available

1. Upgrade Apache Struts to version 2.5.31 or later

2. If immediate upgrade is not possible, implement WAF rules to block requests containing OGNL expressions

3. Review application logs for potential exploitation attempts

4. Consider implementing additional input validation at the application level

CVSS Score
9.8
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2025-32432
Severitycritical
FixAvailable
KEVNot Listed
PublishedMar 21, 2026