CVE Vulnerabilities

CVE-2025-68493

Missing XML Validation

Published: Jan 11, 2026 | Modified: Jan 16, 2026
CVSS 3.x
8.1
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.1 IMPORTANT
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
Ubuntu
root.io logo minimus.io logo echo.ai logo

Missing XML Validation vulnerability in Apache Struts, Apache Struts.

This issue affects Apache Struts: from 2.0.0 before 2.2.1; Apache Struts: from 2.2.1 through 6.1.0.

Users are recommended to upgrade to version 6.1.1, which fixes the issue.

Weakness

The product accepts XML from an untrusted source but does not validate the XML against the proper schema.

Affected Software

NameVendorStart VersionEnd Version
StrutsApache2.0.0 (including)2.3.37 (including)
StrutsApache2.5.0 (including)2.5.33 (including)
StrutsApache6.0.0 (including)6.1.1 (excluding)

Potential Mitigations

  • Always validate XML input against a known XML Schema or DTD.
  • It is not possible for an XML parser to validate all aspects of a document’s content because a parser cannot understand the complete semantics of the data. However, a parser can do a complete and thorough job of checking the document’s structure and therefore guarantee to the code that processes the document that the content is well-formed.

References