CVE-2026-2847Friday, February 27, 2026

Remote Code Execution in Apache Struts Framework via OGNL Expression Injection

Apache Struts versions 2.5.30 through 2.5.32 contain a critical vulnerability allowing remote code execution through OGNL expression injection in the action message handling component. An unauthenticated attacker can execute arbitrary code by sending specially crafted HTTP requests containing malicious OGNL expressions.

Not KEV Listed✓ Fix Available
Remote Code Execution in Apache Struts Framework via OGNL Expression Injection
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

This is a serious security hole in Apache Struts, which is popular software used to build web applications. The vulnerability allows attackers to completely take over servers running vulnerable versions of Struts without needing any password or special access.

The problem occurs because Struts doesn't properly check certain types of web requests before processing them. An attacker can send a specially crafted request to a vulnerable website that tricks the server into running any commands the attacker wants. This could let them steal data, install malware, or cause other damage.

This is particularly dangerous because it can be exploited remotely over the internet without needing to log in first. Any organization using the affected versions of Apache Struts should update their software immediately.

Affected Products

1affected product identified
ProductVendorVersionPatched
>StrutsApache2.5.30-2.5.322.5.33
🔧

Remediation

Fix Available

1. Upgrade Apache Struts to version 2.5.33 or later

2. If immediate upgrade is not possible, implement WAF rules to block requests containing OGNL expressions

3. Monitor for exploitation attempts in application logs

4. Review system for indicators of compromise if exploitation suspected

CVSS Score
9.8
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2026-2847
Severitycritical
FixAvailable
KEVNot Listed
PublishedFeb 27, 2026