DUE TO SPAM, SIGN-UP IS DISABLED. Goto Selfserve wiki signup and request an account.
Summary
XXE vulnerability in XWork componentWho should read this | All Struts 2 developers and users |
|---|---|
Impact of vulnerability | Disclosure of Data, Denial of Service, Server Side Request Forgery |
Maximum security rating | Important |
Recommendation | Upgrade to Struts 6.1.1 at least |
Affected Software | |
Reporters | ZAST.AI - https://zast.ai |
CVE Identifier | CVE-2025-68493 |
Problem
Parsing of XML configuration in XWork component does not validate XML in proper way and it's vulnerable to XML external entity (XXE) injection.
Solution
Upgrade to Struts 6.1.1 at least.
Backward compatibility
This change is backward compatible.
Workaround
Users unable to upgrade immediately can mitigate XXE either by:
- using a custom SAXParserFactory: set
xwork.saxParserFactory=to a custom factory class that disables external entities by default
or
- defining JVM-level configuration: configure the JVM's default XML parser to disable external entities via system properties (set to empty string to block all protocols):
-Djavax.xml.accessExternalDTD="" -Djavax.xml.accessExternalSchema="" -Djavax.xml.accessExternalStylesheet=""