The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
https://www.exploit-db.com/exploits/44643/
https://www.exploit-db.com/exploits/42324/
https://security.netapp.com/advisory/ntap-20180706-0002/
http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-9791
http://struts.apache.org/docs/s2-048.html
Source: Mitre, NVD
Published: 2017-07-10
Updated: 2026-04-21
Known Exploited Vulnerability (KEV)
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.94127