The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression.
https://bugzilla.redhat.com/show_bug.cgi?id=1348238
http://www.securityfocus.com/bid/91275
https://struts.apache.org/docs/s2-037.html
http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000110
http://jvn.jp/en/jp/JVN07710476/index.html
Source: Mitre, NVD
Published: 2016-07-04
Updated: 2025-04-12
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.68825