Apache Struts 2 Bug: A Comedy of Errors Ripe for Exploitation!
A critical security hole in Apache Struts 2 is being exploited with publicly available code. Scoring a CVSS risk rating of 9.5, the flaw in Struts versions 2.0.0 to 6.3.0.2 is now a hacker’s playground. Update to at least Struts 6.4.0 faster than you can say “Equifax breach 2017.”

Hot Take:
Apache Struts 2 strikes again! Just when you thought it was safe to go back in the water, a new security flaw surfaces, making hackers giddy and IT folks twitchy. It’s like the gift that keeps on giving… malware to cybercriminals.
Key Points:
- Apache Struts 2 vulnerability (CVE-2024-53677) is now being exploited with publicly available PoC code.
- This flaw affects several versions and has a critical risk rating of 9.5 out of 10.
- Attackers can exploit the bug for remote code execution (RCE) using path traversal.
- Users are advised to update to Struts version 6.4.0 or later to patch the vulnerability.
- The flaw is linked to a previous vulnerability, CVE-2023-50164, indicating a possible incomplete patch.
Already a member? Log in here