CVE-2025-68493
Apache · Apache Struts
A high-severity vulnerability has been identified in multiple versions of Apache Struts, a widely-used web application framework.
Executive summary
A high-severity vulnerability has been identified in multiple versions of Apache Struts, a widely-used web application framework. This flaw, resulting from missing XML validation, could allow a remote, unauthenticated attacker to access sensitive files, disrupt service, or probe internal networks. Due to the critical nature of this vulnerability and the prevalence of Apache Struts, immediate remediation is strongly advised to prevent potential system compromise and data breaches.
Vulnerability
The vulnerability exists because the application's XML parser does not properly validate or sanitize user-supplied XML input. This allows for an XML External Entity (XXE) injection attack. An unauthenticated remote attacker can exploit this by sending a specially crafted XML request to an affected endpoint. This malicious payload can define and invoke external entities, tricking the server into reading arbitrary local files, initiating server-side requests to internal or external network resources (SSRF), or triggering a denial-of-service condition by consuming excessive system resources.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Successful exploitation poses a significant risk to the organization. Potential consequences include the exfiltration of sensitive data, such as configuration files containing credentials, proprietary source code, and customer information, leading to severe data breaches and regulatory fines. Furthermore, an attacker could cause a denial-of-service, rendering critical applications unavailable and impacting business operations, customer trust, and revenue. This vulnerability could also serve as an initial foothold for an attacker to pivot and compromise other systems within the internal network.
Remediation
Immediate Action: The primary remediation is to apply the security updates provided by the Apache Software Foundation immediately. Patching should be prioritized for all internet-facing systems running the affected software. After patching, it is crucial to monitor for any signs of exploitation attempts by reviewing web server and application access logs for suspicious activity.
Proactive Monitoring: Security teams should actively monitor for indicators of compromise. This includes inspecting web server logs for inbound requests containing XML payloads with suspicious DTD (Document Type Definition) elements like <!ENTITY or SYSTEM. Monitor for unusual outbound network traffic originating from the application servers, which could indicate an SSRF attack. Endpoint monitoring should be configured to alert on anomalous processes being spawned by the web server process (e.g., curl, cat, or network scanning tools).
Compensating Controls: If immediate patching is not feasible, implement compensating controls to reduce risk. Deploy or update a Web Application Firewall (WAF) with rules specifically designed to detect and block XXE attack patterns. If possible, configure the application's XML parser to disable DTD processing and external entity resolution. Additionally, enforce strict egress filtering on the server to limit its ability to make outbound network connections, thereby mitigating the impact of SSRF.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high severity (CVSS 8.1) of this vulnerability and the history of widespread exploitation of similar flaws in Apache Struts, we recommend treating this as a critical priority. Organizations must apply the vendor-supplied patches to all affected systems without delay, starting with publicly accessible applications. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its characteristics make it a strong candidate for future inclusion. Proactive patching and monitoring are essential to prevent a potentially significant security incident.