A vulnerability introduced by forcing parameter inclusion in the URL and Anchor Tag allows remote command execution, session access and manipulation and XSS attacks. A request that included a specially crafted request parameter could be used to inject arbitrary OGNL code into the stack, afterward used as request parameter of an URL or A tag , which will cause a further evaluation.
The issue was originally addressed by Struts 188.8.131.52 and Security Announcement S2-013. However, the solution introduced with 184.108.40.206 did not address all possible attack vectors, such that every version of Struts 2 before 220.127.116.11 is still vulnerable to such attacks.
It is strongly recommended to upgrade to Struts 18.104.22.168, which contains the corrected OGNL and XWork library.