Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag.
https://bugzilla.redhat.com/show_bug.cgi?id=967656
http://www.securityfocus.com/bid/60166
https://cwiki.apache.org/confluence/display/WW/S2-013
http://struts.apache.org/development/2.x/docs/s2-013.html
Source: Mitre, NVD
Published: 2013-07-10
Updated: 2025-04-11
Base Score: 9.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS: 0.92576