CVE-2026-2874Saturday, February 28, 2026

Remote Code Execution in Apache Struts Framework via OGNL Expression Injection

A critical vulnerability in Apache Struts versions 2.5.0 through 2.5.30 allows remote attackers to execute arbitrary code via crafted OGNL expressions in HTTP request parameters. The vulnerability exists due to insufficient validation of user-supplied data in the framework's core parameter processing mechanism.

Not KEV Listed✓ Fix Available
Remote Code Execution in Apache Struts Framework via OGNL Expression Injection
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

This is a serious security flaw in Apache Struts, which is popular software used to build web applications. The vulnerability allows attackers to take complete control of affected web servers just by sending specially crafted web requests. They don't need any password or special access - they can simply send a malicious request to the website and potentially take over the entire server.

This is particularly dangerous because Apache Struts is used by many large organizations, including Fortune 500 companies and government agencies. If left unpatched, attackers could steal sensitive data, modify websites, or use the compromised servers to attack other systems.

Affected Products

1affected product identified
ProductVendorVersionPatched
>StrutsApache2.5.0-2.5.302.5.31
🔧

Remediation

Fix Available

1. Immediately upgrade Apache Struts to version 2.5.31 or later

2. If immediate upgrade is not possible, implement WAF rules to filter OGNL expressions in HTTP parameters

3. Monitor systems for suspicious OGNL-related activity

4. Review application logs for potential exploitation attempts

CVSS Score
9.8
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2026-2874
Severitycritical
FixAvailable
KEVNot Listed
PublishedFeb 28, 2026