CVE-2026-1581Thursday, February 26, 2026

Remote Code Execution in Apache Struts Expression Language Evaluation

Apache Struts versions 2.5.0 through 2.5.30 contain an expression language evaluation vulnerability in the tag attributes parser that allows remote attackers to execute arbitrary code via crafted OGNL expressions in tag attributes.

Not KEV Listed✓ Fix Available
Remote Code Execution in Apache Struts Expression Language Evaluation
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

This security flaw affects Apache Struts, which is software used to build web applications. The vulnerability allows attackers to trick the application into running malicious code by sending specially crafted web requests. This is particularly dangerous because an attacker doesn't need any special access or passwords - they can attack the application just by sending requests over the internet.

If successfully exploited, attackers could potentially take complete control of the affected web server, steal sensitive data, or use the server to attack other systems. This is especially concerning for businesses and organizations that use Apache Struts in their web applications.

Affected Products

1affected product identified
ProductVendorVersionPatched
>StrutsApache2.5.0-2.5.302.5.31
🔧

Remediation

Fix Available

1. Upgrade Apache Struts to version 2.5.31 or later

2. If immediate upgrade is not possible, implement WAF rules to filter malicious OGNL expressions

3. Review and restrict access to affected endpoints

4. Monitor for exploitation attempts in application logs

CVSS Score
9.8
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2026-1581
Severitycritical
FixAvailable
KEVNot Listed
PublishedFeb 26, 2026