The XML Trap: CVE-2025-68493, a Critical Struts 2 Flaw Exposing Data
- Jan 11
- 2 min read
Key Findings
A new vulnerability, CVE-2025-68493, has been discovered in the Apache Struts 2 web application framework.
The flaw, which affects multiple versions of Struts 2, allows for XML External Entity (XXE) injection attacks.
The vulnerability can lead to data disclosure, denial of service, and server-side request forgery (SSRF).
The issue stems from improper validation of XML configurations in the XWork component of Struts 2.
Background
Apache Struts 2 is a popular open-source web application framework for Java. It is widely used in enterprise applications across various industries. The framework's XWork component, which powers the command-pattern framework, is the target of the vulnerability.
Impact
The CVE-2025-68493 vulnerability can have a significant impact on systems running affected versions of Apache Struts 2. Attackers can leverage the flaw to:
Disclose sensitive data by tricking the application into fetching external resources.
Cause denial of service by exhausting server resources.
Perform server-side request forgery (SSRF) to access internal systems.
Affected Versions
The vulnerability affects the following versions of Apache Struts 2:
Struts 2.0.0 through 2.3.37 (End-of-Life)
Struts 2.5.0 through 2.5.33 (End-of-Life)
Struts 6.0.0 through 6.1.0
Mitigation
The Apache Struts team recommends upgrading to Struts 6.1.1 or higher to permanently address the security issue. The upgrade is backward-compatible, meaning it should not break existing applications.
For organizations unable to upgrade immediately, the report suggests the following workarounds:
Use a custom SAXParserFactory that disables external entities.
Define JVM-level configurations to block external DTD and Schema access via system properties like `-Djavax.xml.accessExternalDTD=""`.
Conclusion
The CVE-2025-68493 vulnerability in Apache Struts 2 highlights the importance of keeping web application frameworks up-to-date and properly configured. Security teams should act quickly to assess their exposure and implement the necessary mitigations to protect their systems from potential attacks.
Sources
https://securityonline.info/the-xml-trap-critical-struts-2-flaw-cve-2025-68493-exposes-data/
https://securityonline.info/cve-2025-68637-critical-apache-uniffle-flaw-exposes-clusters-to-eavesdropping/

Comments