Apache Struts 2.x before 2.3.20.3, 2.3.24.3, and 2.3.28 allows remote attackers to execute arbitrary code via a %{} sequence in a tag attribute, aka forced double OGNL evaluation.
{
"github_reviewed": true,
"nvd_published_at": "2016-04-12T16:59:00Z",
"cwe_ids": [
"CWE-20"
],
"github_reviewed_at": "2023-07-28T21:26:42Z",
"severity": "HIGH"
}