CVE-2025-47813Tuesday, March 17, 2026

Remote Code Execution in Apache Struts Framework Expression Language Processor

A remote code execution vulnerability exists in Apache Struts versions 2.5.0 through 2.5.30 due to improper validation of OGNL expressions in the expression language processor. An unauthenticated attacker can execute arbitrary code on affected systems by submitting specially crafted requests containing malicious OGNL expressions.

Not KEV Listed✓ Fix Available
Remote Code Execution in Apache Struts Framework Expression Language Processor
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

There is a serious security flaw in a popular web application framework called Apache Struts. The problem lies in how the software processes certain types of commands or expressions that come from users.

Imagine the software as a security guard that's supposed to check everyone's ID before letting them in. This vulnerability is like finding out the guard isn't actually checking IDs properly, allowing potentially dangerous people to walk right in.

Hackers can exploit this by sending specially crafted commands to websites using this software, potentially taking control of the web server and accessing sensitive information. This is particularly concerning because the attack can be performed by anyone on the internet, without needing a password or any special access.

Affected Products

1affected product identified
ProductVendorVersionPatched
>StrutsApache2.5.0-2.5.302.5.31
🔧

Remediation

Fix Available

1. Upgrade Apache Struts to version 2.5.31 or later

2. If immediate upgrade is not possible, implement WAF rules to block requests containing OGNL expressions

3. Consider implementing additional input validation at the application level

4. Monitor system logs for potential exploitation attempts

CVSS Score
9.8
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2025-47813
Severitycritical
FixAvailable
KEVNot Listed
PublishedMar 17, 2026