Cyber Posture

CVE-2025-66675

High

Published: 10 December 2025

Published
10 December 2025
Modified
16 December 2025
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
EPSS Score 0.0015 34.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion. This issue affects Apache Struts: from 2.0.0 through 6.7.4, from 7.0.0 through 7.0.3. Users are recommended to upgrade to version 6.8.0 or 7.1.1, which…

more

fixes the issue. It's related to https://cve.org/CVERecord?id=CVE-2025-64775 - this CVE addresses missing affected version 6.7.4

Mitigating Controls (NIST 800-53 r5)AI

prevent

Remediating the specific flaw in Apache Struts multipart request processing by upgrading to fixed versions 6.8.0 or 7.1.1 directly prevents disk exhaustion from file leaks.

prevent

Denial-of-service protection mechanisms such as rate limiting and request throttling prevent remote attackers from sending crafted multipart requests that exhaust disk resources.

preventdetect

Resource availability protections monitor and limit disk usage to block exhaustion attacks caused by incomplete cleanup of leaked files from multipart requests.

Security SummaryAI

CVE-2025-66675 is a denial-of-service vulnerability in Apache Struts stemming from a file leak during multipart request processing, which can lead to disk exhaustion. The issue affects Apache Struts versions from 2.0.0 through 6.7.4 and from 7.0.0 through 7.0.3. It has a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H) and is associated with CWE-459 (Incomplete Cleanup).

A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By sending crafted multipart requests, the attacker triggers incomplete file cleanup, causing files to accumulate on disk and exhaust storage resources, resulting in high availability impact and potential service disruption. A low confidentiality impact is also possible due to leaked files.

Apache recommends upgrading to version 6.8.0 or 7.1.1, which address the issue. This CVE supplements CVE-2025-64775 by including the previously missing affected version 6.7.4. Additional details are available in the Apache Struts security advisory at https://cwiki.apache.org/confluence/display/WW/S2-068 and the related CVE record at https://cve.org/CVERecord?id=CVE-2025-64775.

Details

CWE(s)

Affected Products

apache
struts
2.0.0 — 2.3.37 · 2.5.0 — 2.5.33 · 6.0.0 — 6.8.0

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

The vulnerability allows remote unauthenticated exploitation of a public-facing web application (Apache Struts) to cause disk exhaustion via crafted multipart requests, directly enabling public-facing app exploitation (T1190) and application exploitation for endpoint DoS (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References