Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.
{
"severity": "HIGH",
"github_reviewed_at": "2022-11-03T20:39:47Z",
"cwe_ids": [
"CWE-94"
],
"nvd_published_at": "2013-07-16T18:55:00Z",
"github_reviewed": true
}