CVE-2025-66675: Apache Struts DoS Vulnerability Leads to Disk Exhaustion

Posted DateDecember 17, 2025
Posted Time 3   min Read
Summarize with :

A newly disclosed denial-of-service vulnerability, CVE-2025-66675, affects a wide range of Apache Struts 2 versions and poses a serious availability risk for applications that handle file uploads. While the EPSS score is 0.05%, indicating a low probability of exploitation in the next 30 days, the vulnerability still represents a high availability risk for exposed and unpatched environments.

Apache Struts is a widely used Java web application framework, and this vulnerability impacts both legacy and newer deployments still running vulnerable releases.

What Is CVE-2025-66675?

Risk Analysis

Severity: HIGH
CVSSv3.1: Base Score: 8.2 HIGH

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Exploit available in public: No
Exploit complexity: Low

EPSS Score: 0.05%

CVE-2025-66675 is a denial-of-service (DoS) vulnerability caused by incomplete cleanup of temporary files created during multipart/form-data request handling. Multipart requests are commonly used for file uploads, and Apache Struts automatically creates temporary files to process these requests.

Due to a vulnerability in the cleanup logic, these temporary files are not reliably removed once request processing completes. When multipart requests are repeatedly sent, the temporary files accumulate on disk, steadily consuming available storage space.

How CVE-2025-66675 Is Exploited

The exploitation process is straightforward and requires no authentication or special permissions. An attacker can continuously submit multipart upload requests containing files or large form data. Each request causes Apache Struts to create temporary files that are not fully cleaned up.

Over time, this behavior leads to disk exhaustion. Once disk space is depleted, the affected application may stop responding, crash, or fail to generate logs. In severe cases, the entire server becomes unstable, resulting in prolonged service outages.

Because multipart handling is enabled by default in many Struts deployments, even applications that do not actively rely on file uploads may still be exposed.

The vulnerability affects a broad range of Apache Struts releases, highlighting its long-standing nature:

  • Struts 0.0 through 2.3.37
  • Struts 5.0 through 2.5.33
  • Struts 0.0 through 6.7.4
  • Struts 0.0 through 7.0.3

CVE-2025-66675 was issued to correct incomplete affected-version information in CVE-2025-64775, specifically adding Struts version 6.7.4 to the impacted range. Both CVEs describe the same underlying vulnerability and should be addressed together.

CVE-2025-66675: Why This DoS Vulnerability Is High Risk

Although CVE-2025-66675 does not allow remote code execution or data manipulation, its availability impact is significant. The attack is remote, unauthenticated, and low complexity, making it easy to automate and difficult to detect early without proper monitoring.

For organizations running customer-facing or business-critical applications, disk exhaustion attacks can cause operational disruption, SLA violations, and reputational damage. The risk is further amplified in environments where legacy or end-of-life Struts versions are still in use.

Mitigation and Remediation Guidance

  • Upgrade immediately to a patched version of Apache Struts to fully resolve the multipart file cleanup vulnerability.
    • Fixed versions: Apache Struts 6.8.0 and Apache Struts 7.1.1
  • Prioritize upgrades for internet-facing and business-critical applications that support file uploads or multipart request handling.
  • If immediate upgrading is not possible, implement temporary risk-reduction measures, including:
    • Isolating file upload temporary storage to a dedicated, size-limited directory to prevent system-wide disk exhaustion
    • Monitoring disk usage closely and setting alerts for abnormal growth patterns
  • Apply additional safeguards where feasible:
    • Enforce rate limiting on multipart upload requests
    • Disable file upload functionality if it is not required by the application

AppTrana Coverage for CVE-2025-66675

AppTrana WAAP provides out-of-the-box protection against exploitation attempts targeting CVE-2025-66675 in Apache Struts. AppTrana WAF detects and blocks malicious multipart request patterns designed to abuse file upload handling and trigger disk exhaustion conditions.

Example of multipart upload abuse associated with CVE-2025-66675, blocked by AppTrana WAAP protections.

AppTrana WAAP Coverage for CVE-2025-66675 (Denial of Service (DoS) vulnerability in Apache Struts)

Stay tuned for more relevant and interesting security articles. Follow Indusface on FacebookTwitter, and LinkedIn.

AppTrana WAAP

Bhargavi Pallati

Bhargavi Pallati is a Security Researcher at Indusface with experience in threat analysis, web application security, and detection engineering. She has a strong background as a Security Analyst and has worked extensively on vulnerability assessment and coverage verification. Bhargavi focuses on analyzing emerging attack patterns, strengthening application-level defenses, and improving security controls through continuous research and learning.

Share Article:

Join 51000+ Security Leaders

Get weekly tips on blocking ransomware, DDoS and bot attacks and Zero-day threats.

We're committed to your privacy. indusface uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.