{"id":"CVE-2016-0785","details":"Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a \"%{}\" sequence in a tag attribute, aka forced double OGNL evaluation.","aliases":["GHSA-876p-4wgc-75rx"],"modified":"2026-04-10T03:45:59.164003Z","published":"2016-04-12T16:59:00.123Z","references":[{"type":"ADVISORY","url":"http://struts.apache.org/docs/s2-029.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/85066"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1035271"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/struts","events":[{"introduced":"2c0a197cea8fdc7d8cda5eeaa15a1c76507ac0a5"},{"fixed":"bbbf43ec59e7bef3b07e9065dc9784c18a95d58b"},{"introduced":"a40e9a90bf8b5039728ff312852991e7d580bff4"},{"last_affected":"7a9863169f7d981be0d2d57437974ae2cc0c8bd3"}],"database_specific":{"versions":[{"introduced":"2.0.0"},{"fixed":"2.3.20.3"},{"introduced":"2.3.21"},{"last_affected":"2.3.24.1"}]}}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-0785.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}