High severity8.8NVD Advisory· Published Oct 16, 2017· Updated May 13, 2026
CVE-2016-4461
CVE-2016-4461
Description
Apache Struts 2.x before 2.3.29 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0785.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.struts:struts2-coreMaven | >= 2.0.0, < 2.3.29 | 2.3.29 |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.securityfocus.com/bid/91277nvdThird Party AdvisoryVDB Entry
- github.com/advisories/GHSA-864w-r5qj-h6fjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2016-4461ghsaADVISORY
- security.netapp.com/advisory/ntap-20180629-0004/nvdThird Party Advisory
- struts.apache.org/docs/s2-036.htmlnvdMitigationVendor AdvisoryWEB
- security.netapp.com/advisory/ntap-20180629-0004ghsaWEB
News mentions
0No linked articles in our index yet.