Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.
http://www.securityfocus.com/bid/64758
http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html
https://cwiki.apache.org/confluence/display/WW/S2-015
http://struts.apache.org/development/2.x/docs/s2-015.html
Source: Mitre, NVD
Published: 2013-07-16
Updated: 2025-04-11
Base Score: 9.3
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
Severity: High
Base Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS: 0.90905