CVE-2026-2846Friday, February 27, 2026

Remote Code Execution in Apache Struts Expression Language Evaluation

A remote code execution vulnerability exists in Apache Struts versions 2.5.30 through 2.5.32 due to improper validation of OGNL expressions in the expression language evaluation engine. An unauthenticated attacker can execute arbitrary code on affected systems by submitting specially crafted expressions.

Not KEV Listed✓ Fix Available
Remote Code Execution in Apache Struts Expression Language Evaluation
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

There is a serious security flaw in Apache Struts, which is popular software used to build web applications. The vulnerability allows attackers to run malicious code on servers running vulnerable versions of Struts without needing any password or login credentials.

The problem occurs because Struts doesn't properly check certain types of commands before running them. This is like having a security guard who doesn't properly inspect visitors' bags before letting them into a building. An attacker can trick the system into running dangerous commands by sending specially formatted web requests.

This vulnerability is particularly concerning because it's easy to exploit and could give attackers complete control over affected web servers.

Affected Products

1affected product identified
ProductVendorVersionPatched
>StrutsApache2.5.30-2.5.322.5.33
🔧

Remediation

Fix Available

1. Upgrade Apache Struts to version 2.5.33 or later

2. If immediate upgrade is not possible, implement WAF rules to filter malicious OGNL expressions

3. Consider implementing additional input validation at the application level

4. Monitor system logs for potential exploitation attempts

CVSS Score
9.8
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2026-2846
Severitycritical
FixAvailable
KEVNot Listed
PublishedFeb 27, 2026