CVE-2026-33017Sunday, March 29, 2026

Remote Code Execution in Apache Struts 3.0 Expression Language Processor

Apache Struts 3.0.0 through 3.0.12 contains a critical vulnerability in its expression language (EL) processor that allows remote attackers to execute arbitrary code via crafted OGNL expressions in HTTP request parameters.

Not KEV Listed✓ Fix Available
Remote Code Execution in Apache Struts 3.0 Expression Language Processor
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

A serious security flaw was found in Apache Struts, which is popular software used to build web applications. The vulnerability allows hackers to take complete control of servers running the affected versions of Struts by sending specially crafted web requests.

This is particularly dangerous because an attacker doesn't need any special access or credentials to exploit it - they just need to be able to send requests to a website running the vulnerable version of Struts. Once exploited, attackers can run any commands they want on the server, potentially stealing data or taking over the entire system.

Affected Products

1affected product identified
ProductVendorVersionPatched
>StrutsApache3.0.0-3.0.123.0.13
🔧

Remediation

Fix Available

1. Immediately upgrade to Apache Struts version 3.0.13 or later

2. If immediate upgrade is not possible, implement WAF rules to filter malicious OGNL expressions

3. Monitor for suspicious requests containing OGNL expressions

4. Review application logs for potential exploitation attempts

CVSS Score
9.8
CriticalCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Vector (v3.1)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2026-33017
Severitycritical
FixAvailable
KEVNot Listed
PublishedMar 29, 2026