Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64775: CWE-459 Incomplete Cleanup in Apache Software Foundation Apache Struts

0
High
VulnerabilityCVE-2025-64775cvecve-2025-64775cwe-459
Published: Mon Dec 01 2025 (12/01/2025, 16:07:36 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Struts

Description

Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion. This issue affects Apache Struts: from 2.0.0 through 6.7.0, from 7.0.0 through 7.0.3. Users are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue.

AI-Powered Analysis

AILast updated: 12/08/2025, 17:11:47 UTC

Technical Analysis

CVE-2025-64775 is a Denial of Service vulnerability classified under CWE-459 (Incomplete Cleanup) affecting the Apache Struts framework, a widely used open-source Java web application framework. The vulnerability exists in the multipart request processing component, where temporary files created during request handling are not properly cleaned up. This leads to file leaks that accumulate on the server's disk, eventually causing disk exhaustion and service disruption. The affected versions span a broad range, from 2.0.0 through 6.7.0 and 7.0.0 through 7.0.3, indicating a long-standing issue that was only recently addressed. The vulnerability can be exploited remotely without any authentication or user interaction, making it accessible to unauthenticated attackers over the network. The CVSS v3.1 base score of 7.5 reflects a high severity due to the ease of exploitation and the impact on availability. While no known exploits have been reported in the wild yet, the potential for denial of service attacks is significant, especially for organizations running critical web services on Apache Struts. The recommended remediation is to upgrade to Apache Struts versions 6.8.0 or 7.1.1, where the incomplete cleanup logic has been fixed. Additional technical controls such as limiting multipart request sizes and monitoring disk space usage can help mitigate the risk until patches are applied.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of web applications built on Apache Struts. Disk exhaustion caused by file leaks can lead to service outages, impacting business continuity, customer trust, and potentially causing financial losses. Critical infrastructure and government services relying on Apache Struts may face operational disruptions. The lack of required authentication and user interaction lowers the barrier for attackers, increasing the likelihood of exploitation attempts. Organizations with high traffic web applications are particularly vulnerable due to the increased volume of multipart requests that can accelerate disk consumption. Additionally, denial of service incidents can have cascading effects on dependent systems and services. The impact is heightened in sectors such as finance, healthcare, and public administration, where uptime and service reliability are paramount.

Mitigation Recommendations

1. Immediately upgrade Apache Struts to versions 6.8.0 or 7.1.1 where the vulnerability is patched. 2. Implement strict limits on multipart request sizes at the web server or application level to reduce the potential for disk exhaustion. 3. Monitor disk usage continuously on servers running Apache Struts to detect abnormal increases in temporary file storage. 4. Configure automated cleanup scripts or processes to remove orphaned temporary files if patching cannot be done immediately. 5. Employ web application firewalls (WAFs) with rules to detect and block suspicious multipart requests that could trigger the vulnerability. 6. Conduct regular security audits and vulnerability scans focusing on Apache Struts components. 7. Educate development and operations teams about the risks associated with multipart request handling and proper resource management. 8. Isolate critical applications on dedicated infrastructure to limit the blast radius of potential denial of service attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-11-11T15:12:23.069Z
Cvss Version
null
State
PUBLISHED

Threat ID: 692dbfd095b0bac45939d90e

Added to database: 12/1/2025, 4:18:24 PM

Last enriched: 12/8/2025, 5:11:47 PM

Last updated: 1/15/2026, 11:00:26 PM

Views: 338

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats