Security
Jan 20, 2026

CVE-2025-68493: Why This Apache Struts Vulnerability Is a Bigger Warning Sign

CVE-2025-68493 exposes how unsupported Apache Struts turns routine vulnerabilities into permanent risk

Give me the TL;DR
CVE-2025-68493: Why This Apache Struts Vulnerability Is a Bigger Warning Sign
For Qualys admins, NES for .NET directly resolves the EOL/Obsolete Software:   Microsoft .NET Version 6 Detected vulnerability, ensuring your systems remain secure and compliant. Fill out the form to get pricing details and learn more.

A new high-severity vulnerability, CVE-2025-68493, has been disclosed in Apache Struts. At a technical level, it is an XML External Entity (XXE) flaw in the XWork component that can lead to remote code execution (RCE).

At a strategic level, it reinforces a much larger and more uncomfortable reality: unsupported Struts deployments dramatically increase security risk.

What Is CVE-2025-68493?

CVE-2025-68493 is an XXE vulnerability caused by missing or incomplete XML parsing safeguards in the XWork configuration parser.

Because external entities are not properly restricted, an attacker can supply malicious XML that causes the application to:

  • Read arbitrary files from the server
  • Perform server-side request forgery (SSRF)
  • Trigger denial-of-service conditions
  • In certain scenarios, escalate to remote code execution

This is not a theoretical issue. XXE flaws are a well-understood and frequently exploited class of vulnerability, especially in enterprise Java applications that rely on XML-heavy configuration and request handling.

Affected Versions

Open Source Struts (OSS):

  • = 2.0.0 ≤ 2.3.37
  • = 2.5.0 ≤ 2.5.33
  • = 6.0.0 < 6.1.1


NES for Apache Struts:

  • = 2.5.33-struts2-2.5.34 < 2.5.33-struts2-2.5.39

Severity: High
Category: Remote Code Execution
Fix date: January 15, 2025

The vulnerability is already fixed in NES for Apache Struts.

The Real Risk: Unsupported Struts in Production

This CVE matters on its own. But it matters more because of where many Struts applications actually live today.

Large numbers of production systems are still running:

  • End-of-life Struts versions
  • Forked or frozen builds
  • Legacy apps that cannot be easily upgraded

For those environments, vulnerabilities like CVE-2025-68493 create a stark divide.

If you are on a supported path with active security maintenance, this is a patch-and-move-on event.

If you are running unsupported Struts, it is a permanent exposure.

Why Unsupported Struts Is a Security Multiplier

Unsupported frameworks don’t just miss one fix. They miss every future fix.

When a vulnerability like this is discovered:

  • There is no upstream patch
  • There is no CVE remediation path
  • Mitigations become manual, fragile, and incomplete
  • Auditors see unsupported software, not best effort

Over time, these risks stack. XXE today. Something worse tomorrow.

Mitigation Options

If you are affected, there are three realistic approaches.

Upgrade to a Supported Struts Version

This is the cleanest option, but often unrealistic for deeply embedded or highly customized applications.

Apply Defensive Configuration

You can reduce exposure by disabling external entities at the parser or JVM level, for example:

  • Custom SAXParserFactory that blocks external entities
  • JVM flags disabling external DTDs, schemas, and stylesheets

These mitigations help, but they do not replace a real patch.

Use Supported Extended Security Builds

NES for Apache Struts provides a drop-in patched version that fixes CVE-2025-68493 without requiring a framework migration. This keeps vulnerable applications protected while teams plan longer-term modernization.

The Broader Lesson

CVE-2025-68493 is not an anomaly. It is the expected outcome of continued security research applied to mature frameworks.

The uncomfortable truth is this:

Unsupported software does not stop accumulating vulnerabilities just because development stops.

It simply stops receiving fixes.

If Apache Struts is still critical to your business, supportability is no longer a theoretical concern. It is a security requirement.

And vulnerabilities like this one are the proof.

Frequently Asked Questions

What is CVE-2025-68493?

CVE-2025-68493 is a high-severity XML External Entity (XXE) vulnerability in the XWork component of Apache Struts. It can be exploited to read arbitrary files, perform server-side request forgery, cause denial of service, and potentially escalate to remote code execution.

Which Apache Struts versions are affected by CVE-2025-68493?

The vulnerability affects multiple open-source Apache Struts versions, including:

  • Struts 2 versions >=2.0.0 to 2.3.37

  • Struts 2 versions >=2.5.0 to 2.5.33

  • Struts 6 versions >=6.0.0 and <6.1.1

It also affects specific transitional builds prior to the patched NES releases.

Is CVE-2025-68493 fixed?

Yes. CVE-2025-68493 is fixed in NES for Apache Struts, with the patch released on January 15, 2025. Open-source Struts users must upgrade to a supported version or apply compensating controls.

What happens if I am running an unsupported version of Apache Struts?

If you are running an unsupported or end-of-life Struts version, this vulnerability will not be fixed upstream. Any newly discovered issues become permanent risks unless addressed through extended security support or custom mitigation.

Can configuration changes fully mitigate this vulnerability?

Configuration-based mitigations, such as disabling external entities at the XML parser or JVM level, can reduce exposure. However, they do not provide the same assurance as a vendor-supported security patch and may not cover all exploit paths.

What is the safest way to remediate CVE-2025-68493 without migrating off Struts?

For organizations that cannot immediately migrate, HeroDevs’ NES for Apache Struts provides drop-in, production-ready security patches for CVE-2025-68493 and other vulnerabilities, even for versions that are end of life upstream.

Why do vulnerabilities keep appearing in Apache Struts?

Apache Struts continues to receive security scrutiny because it is widely deployed in enterprise environments. New vulnerabilities are discovered over time, even in mature frameworks. When a version is unsupported, those vulnerabilities remain unpatched.

Is running unsupported Apache Struts a compliance risk?

Yes. Unsupported frameworks are commonly flagged during SOC 2, ISO 27001, PCI DSS, and HIPAA audits. Using a supported or extended-support version is often required to pass security and procurement reviews.

Who provides ongoing security support for end-of-life Apache Struts?

HeroDevs provides Never-Ending Support (NES) for Apache Struts, delivering ongoing security fixes, including CVE remediation, for organizations that rely on Struts but cannot upgrade immediately.

Table of Contents
Author
HeroDevs
Thought Leadership
Open Source Insights Delivered Monthly