Apache Struts 2.x before 2.3.20.3, 2.3.24.3, and 2.3.28 allows remote attackers to execute arbitrary code via a %{}
sequence in a tag attribute, aka forced double OGNL evaluation.
{ "nvd_published_at": "2016-04-12T16:59:00Z", "cwe_ids": [ "CWE-20" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2023-07-28T21:26:42Z" }