# Apache Struts XWork XXE 漏洞
## 概述
Apache Struts 存在缺少 XML 验证的漏洞,可能导致安全风险。
## 影响版本
- Apache Struts 2.0.0 至 2.2.1 之前版本
- Apache Struts 2.2.1 至 6.1.0 版本
## 细节
该漏洞因 Apache Struts 未对 XML 输入进行充分验证,可能使攻击者利用恶意 XML 数据引发安全问题。
## 影响
未授权攻击者可能利用此漏洞执行任意代码或导致拒绝服务等后果。
## 修复建议
升级至 Apache Struts 6.1.1 版本以修复该漏洞。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Apache%20Struts%20S2-069%20XML%20%E5%A4%96%E9%83%A8%E5%AE%9E%E4%BD%93%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2025-68493.md | POC详情 |
标题: S2-069 - Apache Struts 2 Wiki - Apache Software Foundation -- 🔗来源链接
标签:vendor-advisory
神龙速读:
### S2-069: XXE Vulnerability in XWork Component
#### Summary
- **Impacted Vulnerability**: XXE vulnerability in XWork component
- **Impact**: Disclosure of Data, Denial of Service, Server Side Request Forgery
- **Maximum Security Rating**: Important
- **Recommendation**: Upgrade to Struts 6.1.1 at least
#### Affected Software
- Struts 2.0.0 through Struts 2.3.37 (EOL)
- Struts 2.5.0 through Struts 2.5.33 (EOL)
- Struts 6.0.0 through Struts 6.1.0
#### Reporters
- ZAST.AI - https://zast.ai
#### CVE Identifier
- CVE-2025-68493
#### Problem
Parsing of XML configuration in XWork component does not validate XML in proper way and it's vulnerable to XML external entity (XXE) injection.
#### Solution
Upgrade to Struts 6.1.1 at least.
#### Backward Compatibility
This change is backward compatible.
#### Workaround
Users unable to upgrade immediately can mitigate XXE either by:
- Using a custom SAXParserFactory: set `xwork.saxParserFactory` to a custom factory class that disables external entities by default or
- Defining JVM-level configuration: configure the JVM's default XML parser to disable external entities via system properties (set to empty string to block all protocols):
- `-Djavax.xml.accessExternalDTD=""`
- `-Djavax.xml.accessExternalSchema=""`
- `-Djavax.xml.accessExternalStylesheet=""`
暂无评论