CVE-2025-68493

Struts S2-069 (CVE-2025-68493): The Undying Ghost of XML Parsing Past

Alon Barad
Alon Barad
Software Engineer

Jan 13, 2026·6 min read·50 visits

Executive Summary (TL;DR)

A critical XXE flaw in Apache Struts versions 6.0.0 through 6.1.0 (and older EOL versions) allows attackers to weaponize XML configuration parsing. By injecting malicious DTDs, attackers can exfiltrate sensitive files (/etc/passwd) or pivot into internal networks via SSRF. The fix involves upgrading to 6.1.1, which explicitly disables unsafe XML features in the SAXParserFactory.

Apache Struts has returned to the spotlight with S2-069, a classic XML External Entity (XXE) vulnerability residing in the XWork component. Despite being 2026, the framework's core configuration parser failed to disable external entity resolution, allowing attackers with control over configuration inputs to read local files, trigger SSRF, or cause Denial of Service.

Technical Appendix

CVSS Score
8.1/ 10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
EPSS Probability
0.04%
Top 89% most exploited

Affected Systems

Apache Struts 2.0.0 - 2.3.37 (EOL)Apache Struts 2.5.0 - 2.5.33 (EOL)Apache Struts 6.0.0 - 6.1.0

Affected Versions Detail

Product
Affected Versions
Fixed Version
Apache Struts
Apache
>= 2.0.0, <= 2.3.37N/A (EOL)
Apache Struts
Apache
>= 2.5.0, <= 2.5.33N/A (EOL)
Apache Struts
Apache
>= 6.0.0, <= 6.1.06.1.1
AttributeDetail
Attack VectorNetwork (XML Configuration Injection)
CVSS v3.18.1 (High)
CWE IDCWE-611 (XXE)
ImpactInformation Disclosure, SSRF, DoS
EPSS Score0.00037 (Low Probability)
Exploit StatusProof of Concept (PoC) Available
CWE-611
Improper Restriction of XML External Entity Reference

The software processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.

Vulnerability Timeline

Internal Advisory Created by Apache Team
2025-12-19
CVE-2025-68493 Published
2026-01-11
Technical Deep Dive Published by Penligent
2026-01-12

Subscribe to updates

Get the latest CVE analysis reports delivered to your inbox.