Apache Struts vulnerable to path traversal
        
  Critical severity
        
          GitHub Reviewed
      
        Published
          Dec 7, 2023 
          to the GitHub Advisory Database
          •
          Updated Feb 13, 2025 
      
  
Package
Affected versions
>= 6.0.0, < 6.3.0.2
      >= 2.0.0, < 2.5.33
  Patched versions
6.3.0.2
      2.5.33
  Description
        Published by the National Vulnerability Database
      Dec 7, 2023 
    
  
        Published to the GitHub Advisory Database
      Dec 7, 2023 
    
  
        Reviewed
      Dec 7, 2023 
    
  
        Last updated
      Feb 13, 2025 
    
  
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
References