CVE-2026-2697Monday, March 2, 2026

Remote Code Execution in Apache Struts Framework

Apache Struts versions 2.5.0 through 2.5.30 contain a remote code execution vulnerability when processing malformed OGNL expressions in tag attributes, allowing unauthenticated attackers to execute arbitrary code on affected systems.

Not KEV Listed✓ Fix Available
Remote Code Execution in Apache Struts Framework
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

A serious security flaw was found in Apache Struts, which is popular software used to build web applications. The problem allows hackers to run malicious code on servers running vulnerable versions of Struts without needing any password or special access.

This is particularly dangerous because an attacker only needs to send a specially crafted web request to take advantage of the vulnerability. Once exploited, they could potentially take full control of the server, steal data, or use it to attack other systems.

This vulnerability affects many business applications since Apache Struts is widely used in enterprise environments, especially in financial services and government sectors.

Affected Products

1affected product identified
ProductVendorVersionPatched
>StrutsApache2.5.0-2.5.302.5.31
🔧

Remediation

Fix Available

1. Upgrade Apache Struts to version 2.5.31 or later immediately

2. If immediate upgrade is not possible, implement WAF rules to filter malicious OGNL expressions

3. Monitor systems for suspicious OGNL-related activity

4. Review application logs for potential exploitation attempts

CVSS Score
9.8
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2026-2697
Severitycritical
FixAvailable
KEVNot Listed
PublishedMar 2, 2026