7.1.1
19 years ago
6 months ago
Known vulnerabilities in the org.apache.struts:struts2-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
org.apache.struts:struts2-core is a popular open-source framework for developing web applications in the Java programming language. Affected versions of this package are vulnerable to Missing XML Validation. An attacker can access sensitive information or cause a denial of service by submitting specially crafted XML input. How to fix Missing XML Validation? Upgrade | [,6.1.1) |
org.apache.struts:struts2-core is a popular open-source framework for developing web applications in the Java programming language. Affected versions of this package are vulnerable to Incomplete Cleanup in the multipart request processing in the file parameters in OGNL-mapped Value Object. An attacker can cause disk exhaustion by repeatedly sending crafted requests that trigger file leaks. Note: CVE-2025-66675 is a duplicate of CVE-2025-64775 How to fix Incomplete Cleanup? Upgrade | [,6.8.0)[7.0.0,7.1.1) |
org.apache.struts:struts2-core is a popular open-source framework for developing web applications in the Java programming language. Affected versions of this package are vulnerable to Remote Code Execution (RCE) via manipulation of file upload parameters that enable path traversal. When using Notes: This is only exploitable if the application uses Version 6.4.0 deprecates How to fix Remote Code Execution (RCE)? Upgrade | [,7.0.0) |