CVE-2026-23678Tuesday, March 3, 2026

Remote Code Execution in Apache Struts Framework Expression Language Parsing

A remote code execution vulnerability exists in Apache Struts versions 2.5.0 through 2.5.30 due to improper validation of OGNL expressions in the framework's expression language parser. An unauthenticated attacker can execute arbitrary code on affected systems by submitting specially crafted requests containing malicious OGNL expressions.

Not KEV Listed✓ Fix Available
Remote Code Execution in Apache Struts Framework Expression Language Parsing
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

There is a serious security flaw in a popular web development framework called Apache Struts. The problem lies in how the software processes certain types of commands or expressions that come from users.

Imagine the framework as a security guard that's supposed to check if incoming requests are safe before letting them through. In this case, the guard isn't checking thoroughly enough, which means attackers can slip dangerous commands past the security check.

When successful, attackers can take control of the web server and run any commands they want - potentially stealing data, installing malware, or causing other damage. This is especially concerning because attackers don't need any password or special access to exploit this flaw.

Affected Products

1affected product identified
ProductVendorVersionPatched
>StrutsApache2.5.0-2.5.302.5.31
🔧

Remediation

Fix Available

1. Upgrade Apache Struts to version 2.5.31 or later

2. If immediate upgrade is not possible, implement WAF rules to block requests containing OGNL expressions

3. Consider implementing additional input validation at the application level

4. Monitor systems for signs of exploitation attempts

CVSS Score
9.8
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2026-23678
Severitycritical
FixAvailable
KEVNot Listed
PublishedMar 3, 2026