Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/23630?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/23630?format=api",
    "vulnerability_id": "VCID-j8jv-hzsy-nyec",
    "summary": "Apache Struts is Vulnerable to DoS via File Leak\nDenial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion.\n\nThis issue affects Apache Struts: from 2.0.0 through 6.7.0, from 7.0.0 through 7.0.3.\n\nUsers are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue.",
    "aliases": [
        {
            "alias": "CVE-2025-64775"
        },
        {
            "alias": "GHSA-xx7v-hqxh-cjr9"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/66570?format=api",
            "purl": "pkg:maven/org.apache.struts/struts2-core@6.8.0",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@6.8.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/66571?format=api",
            "purl": "pkg:maven/org.apache.struts/struts2-core@7.1.1",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@7.1.1"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/22081?format=api",
            "purl": "pkg:maven/org.apache.struts/struts2-core@2.0.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-2rjv-1thm-dugt"
                },
                {
                    "vulnerability": "VCID-3yq7-n972-j7dh"
                },
                {
                    "vulnerability": "VCID-4agy-6nsx-7ufh"
                },
                {
                    "vulnerability": "VCID-6241-shkt-s7ew"
                },
                {
                    "vulnerability": "VCID-6hrc-fm64-ckhf"
                },
                {
                    "vulnerability": "VCID-79j9-v8gz-rfax"
                },
                {
                    "vulnerability": "VCID-8bsh-bshc-vkgq"
                },
                {
                    "vulnerability": "VCID-95ts-vpk6-uubg"
                },
                {
                    "vulnerability": "VCID-at5c-f8p8-67fh"
                },
                {
                    "vulnerability": "VCID-b59n-uxft-4qgz"
                },
                {
                    "vulnerability": "VCID-d8as-n8hc-j3fj"
                },
                {
                    "vulnerability": "VCID-fv6w-cdtc-kkhx"
                },
                {
                    "vulnerability": "VCID-gfxq-vtry-bqgg"
                },
                {
                    "vulnerability": "VCID-hgj2-vqzn-gyeb"
                },
                {
                    "vulnerability": "VCID-hkjh-35ye-1ugj"
                },
                {
                    "vulnerability": "VCID-j5su-cnqd-6yad"
                },
                {
                    "vulnerability": "VCID-j8jv-hzsy-nyec"
                },
                {
                    "vulnerability": "VCID-k6mz-k1yb-4uej"
                },
                {
                    "vulnerability": "VCID-kdsa-599r-eud7"
                },
                {
                    "vulnerability": "VCID-p9xh-frm5-8ucp"
                },
                {
                    "vulnerability": "VCID-skbn-jggt-uffg"
                },
                {
                    "vulnerability": "VCID-tgd1-s1yg-9fdt"
                },
                {
                    "vulnerability": "VCID-vkb9-11h4-dugp"
                },
                {
                    "vulnerability": "VCID-vnkw-9fa2-zqcm"
                },
                {
                    "vulnerability": "VCID-ygbu-vb2t-jqhx"
                },
                {
                    "vulnerability": "VCID-zxww-8kb3-tufv"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.0.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/67327?format=api",
            "purl": "pkg:maven/org.apache.struts/struts2-core@2.3.37",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-3yq7-n972-j7dh"
                },
                {
                    "vulnerability": "VCID-79j9-v8gz-rfax"
                },
                {
                    "vulnerability": "VCID-87fh-rvvb-6ubq"
                },
                {
                    "vulnerability": "VCID-95ts-vpk6-uubg"
                },
                {
                    "vulnerability": "VCID-b7zy-qhz9-tuar"
                },
                {
                    "vulnerability": "VCID-bgbt-j1n9-6yg5"
                },
                {
                    "vulnerability": "VCID-dk2f-14xj-9bf8"
                },
                {
                    "vulnerability": "VCID-gfxq-vtry-bqgg"
                },
                {
                    "vulnerability": "VCID-hgj2-vqzn-gyeb"
                },
                {
                    "vulnerability": "VCID-j8jv-hzsy-nyec"
                },
                {
                    "vulnerability": "VCID-tgd1-s1yg-9fdt"
                },
                {
                    "vulnerability": "VCID-y5uq-a6dx-3yd4"
                },
                {
                    "vulnerability": "VCID-zxww-8kb3-tufv"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.37"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/32385?format=api",
            "purl": "pkg:maven/org.apache.struts/struts2-core@2.5.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-579w-2k2v-efa2"
                },
                {
                    "vulnerability": "VCID-5qtg-djvn-97ht"
                },
                {
                    "vulnerability": "VCID-74ab-1p1c-4qbd"
                },
                {
                    "vulnerability": "VCID-7c97-nj5a-hqb8"
                },
                {
                    "vulnerability": "VCID-j8jv-hzsy-nyec"
                },
                {
                    "vulnerability": "VCID-mdde-pa5h-w7g4"
                },
                {
                    "vulnerability": "VCID-sf53-bgb2-7ue2"
                },
                {
                    "vulnerability": "VCID-tgd1-s1yg-9fdt"
                },
                {
                    "vulnerability": "VCID-y4qu-21c9-6fav"
                },
                {
                    "vulnerability": "VCID-zkg1-bed6-bbfv"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.5.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/61587?format=api",
            "purl": "pkg:maven/org.apache.struts/struts2-core@2.5.33",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-87fh-rvvb-6ubq"
                },
                {
                    "vulnerability": "VCID-95ts-vpk6-uubg"
                },
                {
                    "vulnerability": "VCID-j8jv-hzsy-nyec"
                },
                {
                    "vulnerability": "VCID-tgd1-s1yg-9fdt"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.5.33"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/58045?format=api",
            "purl": "pkg:maven/org.apache.struts/struts2-core@6.0.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-87fh-rvvb-6ubq"
                },
                {
                    "vulnerability": "VCID-95ts-vpk6-uubg"
                },
                {
                    "vulnerability": "VCID-b7zy-qhz9-tuar"
                },
                {
                    "vulnerability": "VCID-dk2f-14xj-9bf8"
                },
                {
                    "vulnerability": "VCID-gfxq-vtry-bqgg"
                },
                {
                    "vulnerability": "VCID-hpm1-euf1-vff1"
                },
                {
                    "vulnerability": "VCID-j8jv-hzsy-nyec"
                },
                {
                    "vulnerability": "VCID-tgd1-s1yg-9fdt"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@6.0.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/66836?format=api",
            "purl": "pkg:maven/org.apache.struts/struts2-core@7.0.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-95ts-vpk6-uubg"
                },
                {
                    "vulnerability": "VCID-j8jv-hzsy-nyec"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@7.0.0"
        }
    ],
    "references": [
        {
            "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64775.json",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "5.3",
                    "scoring_system": "cvssv3",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                }
            ],
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-64775.json"
        },
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-64775",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.0012",
                    "scoring_system": "epss",
                    "scoring_elements": "0.30484",
                    "published_at": "2026-05-09T12:55:00Z"
                },
                {
                    "value": "0.0012",
                    "scoring_system": "epss",
                    "scoring_elements": "0.30476",
                    "published_at": "2026-05-07T12:55:00Z"
                },
                {
                    "value": "0.0012",
                    "scoring_system": "epss",
                    "scoring_elements": "0.30407",
                    "published_at": "2026-05-05T12:55:00Z"
                },
                {
                    "value": "0.00125",
                    "scoring_system": "epss",
                    "scoring_elements": "0.31279",
                    "published_at": "2026-04-29T12:55:00Z"
                },
                {
                    "value": "0.00171",
                    "scoring_system": "epss",
                    "scoring_elements": "0.37928",
                    "published_at": "2026-05-14T12:55:00Z"
                },
                {
                    "value": "0.00171",
                    "scoring_system": "epss",
                    "scoring_elements": "0.37852",
                    "published_at": "2026-05-12T12:55:00Z"
                },
                {
                    "value": "0.00171",
                    "scoring_system": "epss",
                    "scoring_elements": "0.37875",
                    "published_at": "2026-05-11T12:55:00Z"
                },
                {
                    "value": "0.00193",
                    "scoring_system": "epss",
                    "scoring_elements": "0.41257",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.00193",
                    "scoring_system": "epss",
                    "scoring_elements": "0.41245",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.00193",
                    "scoring_system": "epss",
                    "scoring_elements": "0.41274",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.00193",
                    "scoring_system": "epss",
                    "scoring_elements": "0.41199",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.00193",
                    "scoring_system": "epss",
                    "scoring_elements": "0.41249",
                    "published_at": "2026-04-08T12:55:00Z"
                },
                {
                    "value": "0.00193",
                    "scoring_system": "epss",
                    "scoring_elements": "0.41278",
                    "published_at": "2026-04-11T12:55:00Z"
                },
                {
                    "value": "0.00193",
                    "scoring_system": "epss",
                    "scoring_elements": "0.41247",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.00193",
                    "scoring_system": "epss",
                    "scoring_elements": "0.41233",
                    "published_at": "2026-04-13T12:55:00Z"
                },
                {
                    "value": "0.00193",
                    "scoring_system": "epss",
                    "scoring_elements": "0.41277",
                    "published_at": "2026-04-16T12:55:00Z"
                },
                {
                    "value": "0.00193",
                    "scoring_system": "epss",
                    "scoring_elements": "0.41248",
                    "published_at": "2026-04-18T12:55:00Z"
                },
                {
                    "value": "0.00193",
                    "scoring_system": "epss",
                    "scoring_elements": "0.41176",
                    "published_at": "2026-04-21T12:55:00Z"
                },
                {
                    "value": "0.00262",
                    "scoring_system": "epss",
                    "scoring_elements": "0.49547",
                    "published_at": "2026-04-24T12:55:00Z"
                },
                {
                    "value": "0.00262",
                    "scoring_system": "epss",
                    "scoring_elements": "0.49557",
                    "published_at": "2026-04-26T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-64775"
        },
        {
            "reference_url": "https://cwiki.apache.org/confluence/display/WW/S2-068",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-01T18:22:57Z/"
                }
            ],
            "url": "https://cwiki.apache.org/confluence/display/WW/S2-068"
        },
        {
            "reference_url": "https://github.com/apache/struts",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/apache/struts"
        },
        {
            "reference_url": "http://www.openwall.com/lists/oss-security/2025/12/01/2",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "http://www.openwall.com/lists/oss-security/2025/12/01/2"
        },
        {
            "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418059",
            "reference_id": "2418059",
            "reference_type": "",
            "scores": [],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418059"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64775",
            "reference_id": "CVE-2025-64775",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "value": "HIGH",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64775"
        },
        {
            "reference_url": "https://github.com/advisories/GHSA-xx7v-hqxh-cjr9",
            "reference_id": "GHSA-xx7v-hqxh-cjr9",
            "reference_type": "",
            "scores": [
                {
                    "value": "HIGH",
                    "scoring_system": "cvssv3.1_qr",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/advisories/GHSA-xx7v-hqxh-cjr9"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 459,
            "name": "Incomplete Cleanup",
            "description": "The product does not properly clean up and remove temporary or supporting resources after they have been used."
        },
        {
            "cwe_id": 937,
            "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities",
            "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."
        },
        {
            "cwe_id": 1035,
            "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities",
            "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."
        }
    ],
    "exploits": [],
    "severity_range_score": "5.3 - 8.9",
    "exploitability": "0.5",
    "weighted_severity": "8.0",
    "risk_score": 4.0,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j8jv-hzsy-nyec"
}