Invicti identified a code evaluation (Apache Struts), which occurs when input data is run as code.
This is a highly critical issue and should be addressed as soon as possible.
An attacker can execute arbitrary Apache Struts code on the system. The attacker may also be able to execute arbitrary system commands.
Do not accept input from end users which will be directly interpreted as source code. If this is a business requirement, validate all input to the application by removing any data that could be directly interpreted as Apache Struts source code.

You can search and find all vulnerabilities
