Apache Struts < 2.5.33 - Remote Code Execution
Title source: ruleDescription
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.
Exploits (19)
nomisec
WORKING POC
85 stars
by jakabakos · poc
https://github.com/jakabakos/CVE-2023-50164-Apache-Struts-RCE
nomisec
WORKING POC
57 stars
by dwisiswant0 · remote
https://github.com/dwisiswant0/cve-2023-50164-poc
nomisec
WORKING POC
7 stars
by Trackflaw · poc
https://github.com/Trackflaw/CVE-2023-50164-ApacheStruts2-Docker
nomisec
WORKING POC
3 stars
by Trackflaw · poc
https://github.com/Trackflaw/CVE-2024-10924-Wordpress-Docker
nomisec
WORKING POC
2 stars
by sunnyvale-it · poc
https://github.com/sunnyvale-it/CVE-2023-50164-PoC
nomisec
WORKING POC
1 stars
by Pixel-DefaultBR · remote
https://github.com/Pixel-DefaultBR/CVE-2023-50164
nomisec
WORKING POC
1 stars
by Thirukrishnan · poc
https://github.com/Thirukrishnan/CVE-2023-50164-Apache-Struts-RCE
github
WORKING POC
by enciphers-team · pythonpoc
https://github.com/enciphers-team/cve-exploits/tree/main/cve-2023-50164.py
nomisec
WORKING POC
by AsfandAliMemon25 · remote
https://github.com/AsfandAliMemon25/CVE-2023-50164Analysis-
References (4)
Scores
CVSS v3
9.8
EPSS
0.9286
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lab Environment
COMMUNITY
+1 more images
Community Lab
+14 more repos
Details
VulnCheck KEV
2024-01-31
InTheWild.io
2023-12-13
CWE
CWE-552
Status
published
Products (2)
apache/struts
2.0.0 - 2.5.33
org.apache.struts/struts2-core
2.0.0 - 2.5.33Maven
Published
Dec 07, 2023
Tracked Since
Feb 18, 2026