CVE-2025-68493
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-11

Last updated on: 2026-03-11

Assigner: Apache Software Foundation

Description
Missing XML Validation vulnerability in Apache Struts, Apache Struts. This issue affects Apache Struts: from 2.0.0 before 2.2.1; Apache Struts: from 2.2.1 through 6.1.0. Users are recommended to upgrade to version 6.1.1, which fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-11
Last Modified
2026-03-11
Generated
2026-05-07
AI Q&A
2026-01-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
apache struts From 2.0.0 (inc) to 2.3.37 (inc)
apache struts From 2.5.0 (inc) to 2.5.33 (inc)
apache struts From 6.0.0 (inc) to 6.1.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-611 The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
CWE-112 The product accepts XML from an untrusted source but does not validate the XML against the proper schema.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Missing XML Validation issue in Apache Struts. It affects versions from 2.0.0 before 2.2.1 and from 2.2.1 through 6.1.0. The problem arises because the software does not properly validate XML input, which can lead to security risks.


How can this vulnerability impact me? :

The impact of this vulnerability could include potential security risks such as unauthorized access, data manipulation, or other attacks that exploit the lack of XML validation. Users are advised to upgrade to version 6.1.1 to fix the issue.


What immediate steps should I take to mitigate this vulnerability?

Users are recommended to upgrade Apache Struts to version 6.1.1, which fixes the Missing XML Validation vulnerability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows for data disclosure, denial of service, and server-side request forgery due to improper XML validation. This can lead to unauthorized access or exposure of sensitive data, which may result in non-compliance with data protection regulations such as GDPR and HIPAA that require safeguarding personal and sensitive information. Therefore, organizations using affected versions of Apache Struts could face compliance risks if the vulnerability is exploited. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking the version of Apache Struts in use to see if it falls within the affected versions (2.0.0 through 2.3.37, 2.5.0 through 2.5.33, and 6.0.0 through 6.1.0). Additionally, detection can involve testing for XML External Entity (XXE) processing by sending crafted XML payloads that include external entities to the application and observing if the server processes them, which indicates the vulnerability. While no specific commands are provided, you can use tools like curl or custom scripts to send malicious XML payloads to the Struts application endpoints. For example, using curl to POST an XML payload containing an external entity to the vulnerable endpoint may help detect the issue. It is also recommended to verify if mitigation settings are applied, such as JVM properties disabling external entity processing. Upgrading to Apache Struts version 6.1.1 or later is the recommended fix. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart