VYPR
High severityNVD Advisory· Published Dec 5, 2019· Updated Aug 6, 2024

CVE-2012-1592

CVE-2012-1592

Description

A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Struts2 has a local code execution vulnerability in its XSLT processing, allowing an attacker to upload and execute arbitrary files via a malformed XSLT file.

Vulnerability

Analysis

CVE-2012-1592 describes a local code execution vulnerability in Apache Struts2. The root cause lies in how the framework processes XSLT files. When the application handles a malformed or specially crafted XSLT file during the upload or transformation process, it fails to properly sanitize the input, leading to arbitrary file upload and execution. This is a file upload validation bypass issue within the Struts2 XSLT result type [1].

Exploitation

Prerequisites

Exploitation requires that the targeted Struts2 application exposes functionality that processes XSLT files, such as an upload feature or a transformation endpoint. The attacker needs local access or the ability to upload files to the server. The attack does not require authentication if the vulnerable endpoint is publicly accessible. Once the attacker provides a malformed XSLT file, the Struts2 framework processes it in an unsafe manner, allowing the attacker to write and then execute arbitrary files on the server [2].

Impact

Successful exploitation grants the attacker the ability to execute arbitrary code in the context of the Struts2 application. This can lead to full server compromise, including data theft, installation of backdoors, and further lateral movement within the network. The vulnerability has a CVSS score of 7.5 (High), reflecting the high impact on confidentiality, integrity, and availability [3].

Mitigation

The vulnerability is addressed in later versions of Apache Struts2. Users are strongly advised to upgrade to a patched release. If upgrading is not immediately possible, the recommendation is to restrict access to the Config Browser Plugin and follow general Struts2 security best practices, such as avoiding the use of incoming, untrusted user input in forced expression evaluation and never exposing JSP files directly [1]. The vulnerability has been known for a long time, and while not currently on the CISA KEV list, it should be remediated promptly.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.struts:struts2-coreMaven
>= 2.0, < 2.5.222.5.22

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

17

News mentions

0

No linked articles in our index yet.