Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsYears-Old Vulnerable Apache Struts 2 Versions See 387K Weekly Downloads
Years-Old Vulnerable Apache Struts 2 Versions See 387K Weekly Downloads
Cybersecurity

Years-Old Vulnerable Apache Struts 2 Versions See 387K Weekly Downloads

•January 15, 2026
0
HackRead
HackRead•Jan 15, 2026

Why It Matters

Legacy Struts installations expose enterprises to critical remote‑code risks, and the massive download volume shows the urgency for rapid remediation across the software supply chain.

Key Takeaways

  • •387k weekly downloads of vulnerable Struts versions.
  • •98% of downloads are end‑of‑life releases.
  • •CVE‑2025‑68493 scores 8.8 severity.
  • •AI system Zast AI discovered the flaw.
  • •Only 1.8% of downloads use patched Struts 6.1.1.

Pulse Analysis

The resurgence of outdated Apache Struts binaries underscores a broader supply‑chain challenge: legacy components linger in production long after vendors cease support. Sonatype’s data shows that nearly four hundred thousand developers or automated tools still fetch EOL versions, creating a fertile ground for attackers to exploit known weaknesses. This pattern is not isolated to Struts; it mirrors the growing inventory of unmaintained libraries that inflate an organization’s attack surface and complicate compliance efforts.

What makes this episode notable is the role of AI in vulnerability discovery. Zast AI, an autonomous research platform, flagged the unsafe XML parsing bug faster than traditional manual audits. While AI accelerates identification, it also compresses the window between disclosure and exploitation, leaving teams scrambling to patch. The CVE‑2025‑68493 flaw, with an 8.8 CVSS score, enables crafted inputs to force infinite loops, draining server resources and causing denial‑of‑service conditions. The speed of AI‑driven detection therefore demands equally rapid response mechanisms, such as automated alerts and continuous integration checks.

Mitigating the risk hinges on inventory hygiene and swift migration to the secure Struts 6.1.1 release, which hardens the XML parser against malicious payloads. Enterprises should leverage Software Bill of Materials (SBOMs) and dependency‑tracking tools to locate vulnerable Struts instances across codebases and runtime environments. Coupling these practices with DevSecOps pipelines—where patches are tested and deployed automatically—reduces exposure and aligns with regulatory expectations. As the market increasingly scrutinizes legacy software risk, proactive upgrade strategies will become a competitive differentiator for security‑focused organizations.

Years-Old Vulnerable Apache Struts 2 Versions See 387K Weekly Downloads

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...