Skip to content

[Snyk-dev] Upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33#1

Open
deepal wants to merge 1 commit intomainfrom
snyk-upgrade-a517e634011221a14a4a57be4e893ce3
Open

[Snyk-dev] Upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33#1
deepal wants to merge 1 commit intomainfrom
snyk-upgrade-a517e634011221a14a4a57be4e893ce3

Conversation

@deepal
Copy link
Copy Markdown
Owner

@deepal deepal commented Sep 25, 2025

snyk-top-banner

Snyk has created this PR to upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33.

ℹ️ Keep your dependencies up-to-date. This makes it easier to fix existing vulnerabilities and to more quickly identify and fix newly disclosed vulnerabilities when they affect your project.


  • The recommended version is 47 versions ahead of your current version.

  • The recommended version was released 2 years ago.

Issues fixed by the recommended upgrade:

Issue Score Exploit Maturity
high severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30802
300 No Known Exploit
high severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30803
300 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-COMMONSFILEUPLOAD-30082
300 No Known Exploit
high severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-2635340
300 Proof of Concept
high severity Manipulation of Struts' internals
SNYK-JAVA-ORGAPACHESTRUTS-30060
300 No Known Exploit
high severity Command Injection
SNYK-JAVA-ORGAPACHESTRUTS-30770
300 Mature
high severity Cross-site Request Forgery (CSRF)
SNYK-JAVA-ORGAPACHESTRUTS-30774
300 No Known Exploit
high severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTS-30775
300 No Known Exploit
high severity Access Restriction Bypass
SNYK-JAVA-ORGAPACHESTRUTS-30776
300 No Known Exploit
high severity Remote Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-32477
300 Mature
high severity Arbitrary Command Execution
SNYK-JAVA-ORGAPACHESTRUTS-31495
300 Mature
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31500
300 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31501
300 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-31502
300 No Known Exploit
high severity Denial of Service (DoS)
SNYK-JAVA-ORGAPACHESTRUTS-608098
300 Proof of Concept
high severity Parameter Alteration
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30798
300 No Known Exploit
high severity Command Injection
SNYK-JAVA-ORGAPACHESTRUTSXWORK-451611
300 Mature
high severity Insecure Defaults
SNYK-JAVA-ORGAPACHESTRUTSXWORK-474418
300 No Known Exploit
high severity Server-side Template Injection (SSTI)
SNYK-JAVA-ORGFREEMARKER-1076795
300 Proof of Concept
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30804
300 No Known Exploit
medium severity Information Exposure
SNYK-JAVA-COMMONSFILEUPLOAD-31540
300 No Known Exploit
medium severity Denial of Service (DoS)
SNYK-JAVA-OGNL-30474
300 No Known Exploit
critical severity Arbitrary Code Execution
SNYK-JAVA-COMMONSFILEUPLOAD-30401
300 No Known Exploit
critical severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-1049003
300 Mature
critical severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-30207
300 Mature
critical severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-30771
300 No Known Exploit
critical severity Arbitrary Command Execution
SNYK-JAVA-ORGAPACHESTRUTS-30772
300 Mature
medium severity Cross-site Scripting (XSS)
SNYK-JAVA-ORGAPACHESTRUTS-30773
300 No Known Exploit
critical severity Improper Action Name Cleanup
SNYK-JAVA-ORGAPACHESTRUTS-451610
300 No Known Exploit
medium severity Regular Expression Denial of Service (ReDoS)
SNYK-JAVA-ORGAPACHESTRUTS-460223
300 No Known Exploit
critical severity Remote Code Execution (RCE)
SNYK-JAVA-ORGAPACHESTRUTS-608097
300 Mature
critical severity Directory Traversal
SNYK-JAVA-ORGAPACHESTRUTS-30778
300 No Known Exploit
critical severity Arbitrary Code Execution
SNYK-JAVA-ORGAPACHESTRUTS-31503
300 Mature
high severity Unrestricted Upload of File with Dangerous Type
SNYK-JAVA-ORGAPACHESTRUTS-609765
300 No Known Exploit
high severity Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30799
300 No Known Exploit
medium severity Cross-site Scripting (XSS)
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30800
300 No Known Exploit
medium severity Improper Input Validation
SNYK-JAVA-ORGAPACHESTRUTSXWORK-30801
300 No Known Exploit

Important

  • Check the changes in this PR to ensure they won't cause issues with your project.
  • This PR was automatically created by Snyk using the credentials of a real user.
  • Max score is 1000. Note that the real score may have changed since the PR was raised.

Note: You are seeing this because you or someone else with access to this repository has authorized Snyk to open upgrade PRs.

For more information:

Snyk has created this PR to upgrade org.apache.struts:struts2-core from 2.3.20 to 2.5.33.

See this package in maven:
org.apache.struts:struts2-core

See this project in Snyk:
https://app.polaris-pre-prod.snyk.io/org/dj-org/project/ea22c980-3230-4691-82b3-966b2d4d658e?utm_source=github&utm_medium=referral&page=upgrade-pr
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants