-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
The vulnerability stems from the cleanupActionName method's insufficient sanitization logic. The pre-patch code used a regex to check action names but then tried to 'clean' invalid names by removing disallowed chunks, creating a false sense of security. This allowed OGNL injection through nested expressions like ${${%{action}}}. The commit replaced this flawed cleaning process with an exception throw, indicating the original function was vulnerable to injection attacks when handling malformed action names. The test cases confirm this by changing from expecting cleaned names to expecting exceptions for OGNL patterns.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.struts:struts2-core | maven | >= 2.0.0, < 2.3.29 | 2.3.29 |
| org.apache.struts:struts2-core | maven | >= 2.5-BETA1, < 2.5.1 | 2.5.1 |
Ongoing coverage of React2Shell