CVE-2025-66675
Published: 10 December 2025
Summary
CVE-2025-66675 is a high-severity Incomplete Cleanup (CWE-459) vulnerability in Apache Struts. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 33.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SC-5 (Denial-of-service Protection) and SC-6 (Resource Availability).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Remediating the specific flaw in Apache Struts multipart request processing by upgrading to fixed versions 6.8.0 or 7.1.1 directly prevents disk exhaustion from file leaks.
Denial-of-service protection mechanisms such as rate limiting and request throttling prevent remote attackers from sending crafted multipart requests that exhaust disk resources.
Resource availability protections monitor and limit disk usage to block exhaustion attacks caused by incomplete cleanup of leaked files from multipart requests.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows remote unauthenticated exploitation of a public-facing web application (Apache Struts) to cause disk exhaustion via crafted multipart requests, directly enabling public-facing app exploitation (T1190) and application exploitation for endpoint DoS (T1499.004).
NVD Description
Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion. This issue affects Apache Struts: from 2.0.0 through 6.7.4, from 7.0.0 through 7.0.3. Users are recommended to upgrade to version 6.8.0 or 7.1.1, which…
more
fixes the issue. It's related to https://cve.org/CVERecord?id=CVE-2025-64775 - this CVE addresses missing affected version 6.7.4
Deeper analysisAI
CVE-2025-66675 is a denial-of-service vulnerability in Apache Struts stemming from a file leak during multipart request processing, which can lead to disk exhaustion. The issue affects Apache Struts versions from 2.0.0 through 6.7.4 and from 7.0.0 through 7.0.3. It has a CVSS v3.1 base score of 8.2 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H) and is associated with CWE-459 (Incomplete Cleanup).
A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By sending crafted multipart requests, the attacker triggers incomplete file cleanup, causing files to accumulate on disk and exhaust storage resources, resulting in high availability impact and potential service disruption. A low confidentiality impact is also possible due to leaked files.
Apache recommends upgrading to version 6.8.0 or 7.1.1, which address the issue. This CVE supplements CVE-2025-64775 by including the previously missing affected version 6.7.4. Additional details are available in the Apache Struts security advisory at https://cwiki.apache.org/confluence/display/WW/S2-068 and the related CVE record at https://cve.org/CVERecord?id=CVE-2025-64775.
Details
- CWE(s)