Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Apache Struts 2 Vulnerability Allow Attackers to Steal Sensitive Data

Critical Apache Struts 2 Vulnerability Allow Attackers to Steal Sensitive Data

Posted on January 12, 2026January 12, 2026 By CWS

A essential XML exterior entity (XXE) injection vulnerability has been found in Apache Struts 2, probably exposing hundreds of thousands of functions to information theft and server compromise.

The vulnerability, tracked as CVE-2025-68493, impacts a number of variations of the broadly used framework and requires rapid motion from builders and system directors.

Vulnerability Overview

The safety flaw exists within the XWork element of Apache Struts 2, which handles XML configuration parsing.

The element fails to correctly validate XML enter, leaving functions weak to XXE injection assaults.

CVE IDVulnerability TypeAffected ComponentAffected VersionsCVE-2025-68493XML Exterior Entity (XXE) InjectionXWork ComponentStruts 2.0.0–2.3.37,2.5.0–2.5.33,6.0.0–6.1.0

Risk actors can exploit this weak spot to entry delicate data saved on affected servers or launch denial-of-service assaults.

Safety researchers at ZAST.AI recognized the vulnerability and reported it to the Apache Struts group.

The vulnerability acquired an “Vital” safety score as a consequence of its potential influence on information confidentiality and system availability.

The vulnerability impacts a broad vary of Struts 2 variations at the moment in use throughout organizations worldwide:

Affected Model RangeStatusStruts 2.0.0 – 2.3.37End-of-LifeStruts 2.5.0 – 2.5.33End-of-LifeStruts 6.0.0 – 6.1.0Active Assist

Organizations working any of those variations ought to prioritize safety updates instantly.

Profitable exploitation of CVE-2025-68493 might lead to:

Affect TypeDescriptionData DisclosureAttackers can extract delicate configuration recordsdata, database credentials, and utility secretsServer-Facet Request Forgery (SSRF)Inner community assets and methods will be compromisedDenial of Service (DoS)Software availability will be disrupted utilizing malicious XML payloads

Apache has launched Struts 6.1.1 because the fastened model. Organizations ought to improve to this launch instantly.

The patch maintains backward compatibility, guaranteeing clean deployment with out breaking current functions.

Organizations unable to improve instantly can implement momentary workarounds:

Mitigation ApproachDescriptionCustom SAXParserFactoryConfigure a customized SAXParserFactory by setting xwork.saxParserFactory to a manufacturing unit class that disables exterior entitiesJVM-Degree ConfigurationDisable exterior entities globally utilizing JVM system properties:-Djavax.xml.accessExternalDTD=””-Djavax.xml.accessExternalSchema=””-Djavax.xml.accessExternalStylesheet=””

These workarounds present momentary safety whereas organizations plan improve timelines. CVE-2025-68493 represents a critical menace to Struts 2 deployments worldwide.

Rapid patching must be the highest precedence for safety groups, adopted by verifying that workarounds are in place for methods that can’t be upgraded instantly.

Organizations ought to evaluate their Struts 2 stock and develop an expedited patching schedule to remove publicity to this essential vulnerability.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Apache, Attackers, Critical, Data, Sensitive, Steal, Struts, Vulnerability

Post navigation

Previous Post: Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities
Next Post: Threat actors Allegedly Claim Discord Dataset Containing 78,541,207 Files

Related Posts

7 New Vulnerabilities in GPT-4o and GPT-5 Enables 0-Click Attacks 7 New Vulnerabilities in GPT-4o and GPT-5 Enables 0-Click Attacks Cyber Security News
New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices New Android Malware GhostSpy Let Attacker Take Full Control Over Infected Devices Cyber Security News
Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network Pixie Dust Wi-Fi Attack Exploits Routers WPS to Obtain PIN and Connect With Wireless Network Cyber Security News
Meta Found a New Way to Track Android Users Covertly via Facebook & Instagram Meta Found a New Way to Track Android Users Covertly via Facebook & Instagram Cyber Security News
Spam Campaign Utilizes Fake PDFs for Remote Access Spam Campaign Utilizes Fake PDFs for Remote Access Cyber Security News
TeamViewer DEX Vulnerabilities Let Attackers Trigger DoS Attack and Expose Sensitive Data TeamViewer DEX Vulnerabilities Let Attackers Trigger DoS Attack and Expose Sensitive Data Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News