CVE-2025-49113Wednesday, February 25, 2026

Remote Code Execution in Apache Struts Framework via OGNL Expression Injection

A critical vulnerability in Apache Struts 2.5.0 through 2.5.30 allows remote attackers to execute arbitrary code via crafted OGNL expressions in HTTP request parameters when Dynamic Method Invocation is enabled.

Known Exploited(Mar 15, 2025)✓ Fix Available
Remote Code Execution in Apache Struts Framework via OGNL Expression Injection
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

This is a serious security flaw in Apache Struts, which is popular software used to build web applications. The vulnerability allows hackers to completely take over servers running vulnerable versions of Struts by sending specially crafted web requests.

When a server uses an affected version of Struts with certain features enabled, attackers can trick it into running any commands they want just by sending malicious web traffic. This could let them steal data, install malware, or cause other damage.

This is particularly dangerous because attacks can be launched remotely over the internet without needing any password or special access. Many organizations use Apache Struts, so this vulnerability puts a lot of systems at risk.

Affected Products

1affected product identified
ProductVendorVersionPatched
>StrutsApache2.5.0-2.5.302.5.31
🔧

Remediation

Fix Available

1. Upgrade Apache Struts to version 2.5.31 or later

2. If immediate upgrade is not possible, disable Dynamic Method Invocation by setting 'struts.enable.DynamicMethodInvocation=false'

3. Implement WAF rules to block requests containing suspicious OGNL expressions

4. Monitor systems for exploitation attempts

CVSS Score
9.8
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2025-49113
Severitycritical
FixAvailable
KEVListed
PublishedFeb 25, 2026