-
CVSS Score
-The vulnerability stems from insufficient validation of OGNL expressions during parameter handling. The patch introduced a new 'enableOGNLEvalExpression' flag and modified OgnlUtil.compile() to block eval expressions by default. The pre-patch versions allowed arbitrary OGNL evaluation via parameter names in redirects because:
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.struts:struts2-core | maven | < 2.3.14.3 | 2.3.14.3 |