Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical Apache Struts 2 Vulnerability Allow Attackers to Steal Sensitive Data

Posted on January 12, 2026January 12, 2026 By CWS

A essential XML exterior entity (XXE) injection vulnerability has been found in Apache Struts 2, probably exposing hundreds of thousands of functions to information theft and server compromise.

The vulnerability, tracked as CVE-2025-68493, impacts a number of variations of the broadly used framework and requires rapid motion from builders and system directors.

Vulnerability Overview

The safety flaw exists within the XWork element of Apache Struts 2, which handles XML configuration parsing.

The element fails to correctly validate XML enter, leaving functions weak to XXE injection assaults.

CVE IDVulnerability TypeAffected ComponentAffected VersionsCVE-2025-68493XML Exterior Entity (XXE) InjectionXWork ComponentStruts 2.0.0–2.3.37,2.5.0–2.5.33,6.0.0–6.1.0

Risk actors can exploit this weak spot to entry delicate data saved on affected servers or launch denial-of-service assaults.

Safety researchers at ZAST.AI recognized the vulnerability and reported it to the Apache Struts group.

The vulnerability acquired an “Vital” safety score as a consequence of its potential influence on information confidentiality and system availability.

The vulnerability impacts a broad vary of Struts 2 variations at the moment in use throughout organizations worldwide:

Affected Model RangeStatusStruts 2.0.0 – 2.3.37End-of-LifeStruts 2.5.0 – 2.5.33End-of-LifeStruts 6.0.0 – 6.1.0Active Assist

Organizations working any of those variations ought to prioritize safety updates instantly.

Profitable exploitation of CVE-2025-68493 might lead to:

Affect TypeDescriptionData DisclosureAttackers can extract delicate configuration recordsdata, database credentials, and utility secretsServer-Facet Request Forgery (SSRF)Inner community assets and methods will be compromisedDenial of Service (DoS)Software availability will be disrupted utilizing malicious XML payloads

Apache has launched Struts 6.1.1 because the fastened model. Organizations ought to improve to this launch instantly.

The patch maintains backward compatibility, guaranteeing clean deployment with out breaking current functions.

Organizations unable to improve instantly can implement momentary workarounds:

Mitigation ApproachDescriptionCustom SAXParserFactoryConfigure a customized SAXParserFactory by setting xwork.saxParserFactory to a manufacturing unit class that disables exterior entitiesJVM-Degree ConfigurationDisable exterior entities globally utilizing JVM system properties:-Djavax.xml.accessExternalDTD=””-Djavax.xml.accessExternalSchema=””-Djavax.xml.accessExternalStylesheet=””

These workarounds present momentary safety whereas organizations plan improve timelines. CVE-2025-68493 represents a critical menace to Struts 2 deployments worldwide.

Rapid patching must be the highest precedence for safety groups, adopted by verifying that workarounds are in place for methods that can’t be upgraded instantly.

Organizations ought to evaluate their Struts 2 stock and develop an expedited patching schedule to remove publicity to this essential vulnerability.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Apache, Attackers, Critical, Data, Sensitive, Steal, Struts, Vulnerability

Post navigation

Previous Post: Russia’s APT28 Targeting Energy Research, Defense Collaboration Entities
Next Post: Threat actors Allegedly Claim Discord Dataset Containing 78,541,207 Files

Related Posts

Multiple Jenkins Vulnerability SAML Authentication Bypass And MCP Server Plugin Permissions Cyber Security News
New PoisonSeed Attack Let Attackers Trick Users into Scanning a QR Code with an MFA Authenticator Cyber Security News
New HybridPetya Weaponizing UEFI Vulnerability to Bypass Secure Boot on Outdated Systems Cyber Security News
PoC Exploit Released for Windows Server Update Services Remote Code Execution Vulnerability Cyber Security News
Chinese Front Companies Providing Advanced Steganography Solutions for APT Operations Cyber Security News
Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Infiltrated n8n’s Community Node Ecosystem With a Weaponized npm Package
  • Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click
  • n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
  • Cyber Insights 2026: What CISOs Can Expect in 2026 and Beyond
  • InvisibleJS Emerges as Stealthy JavaScript Obfuscator Using Zero-Width Characters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Infiltrated n8n’s Community Node Ecosystem With a Weaponized npm Package
  • Telegram Exposes Real Users IP Addresses, Bypassing Proxies on Android and iOS in 1-click
  • n8n Supply Chain Attack Abuses Community Nodes to Steal OAuth Tokens
  • Cyber Insights 2026: What CISOs Can Expect in 2026 and Beyond
  • InvisibleJS Emerges as Stealthy JavaScript Obfuscator Using Zero-Width Characters

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark