--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Critical Vulnerability in Apache Struts' number: '2023-095' version: '1.0' original_date: 'December 7, 2023' date: 'December 11, 2023' --- _History:_ * _11/12/2023 --- v1.0 -- Initial publication_ # Summary On December 7, 2023, The Apache Struts group released an update addressing a critical security vulnerability in Apache Struts. This vulnerability could lead, under some circumstances, to remote code execution [1,2]. It is recommended to upgrade to a not vulnerable version as soon as possible. # Technical Details The vulnerability, identified as **CVE-2023-50164** with a CVSS score of 9.8 [3], may allow an attacker to manipulate file upload parameters to enable path traversal. Under some circumstances this may allow the attacker to upload a malicious file that can be used to perform remote code execution. # Affected Products This vulnerability affects Apache Struts versions 2.0.0 through 2.5.32 and 6.0.0 through 6.3.0.1 [2]. # Recommendations It is recommended to upgrade to a not vulnerable version as soon as possible. # References [1] [2] [3]