CVE-2026-22719Wednesday, March 4, 2026

Remote Code Execution in Apache Struts Framework Expression Language Parsing

A remote code execution vulnerability exists in Apache Struts versions 2.5.0 through 2.5.30 due to improper validation of OGNL expressions in the framework's expression language parser. An unauthenticated attacker can execute arbitrary code on affected systems by submitting specially crafted requests containing malicious OGNL expressions.

Not KEV Listed✓ Fix Available
Remote Code Execution in Apache Struts Framework Expression Language Parsing
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

There is a serious security flaw in a popular web development framework called Apache Struts. The problem lies in how the software processes certain types of commands or expressions that come from web requests.

When a website built with Apache Struts receives these requests, it doesn't properly check if they're safe before running them. This means an attacker could send specially crafted malicious commands to the website, and the server would execute them without permission. This could allow attackers to take control of the web server, steal data, or cause other damage.

This is particularly concerning because Apache Struts is used by many large organizations and businesses for their websites and web applications. The vulnerability affects multiple versions of the software that were released over several years.

Affected Products

1affected product identified
ProductVendorVersionPatched
>StrutsApache2.5.0-2.5.302.5.31
🔧

Remediation

Fix Available

1. Upgrade Apache Struts to version 2.5.31 or later

2. If immediate upgrade is not possible, implement WAF rules to block requests containing OGNL expressions

3. Review and restrict access to endpoints that process user input

4. Monitor systems for suspicious OGNL-related activity

CVSS Score
9.8
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2026-22719
Severitycritical
FixAvailable
KEVNot Listed
PublishedMar 4, 2026