Download Netsparker

Expression Language Injection

Netsparker identified an expression language injection, which occurs when input data is evaluated by an expression language interpreter.

This is an important issue and should be addressed as soon as possible.


An attacker can read server-side data, such as the content of server-side variables, and some other inner configuration details. This is a quite dangerous vulnerability because developers assume their server-side code would not be read by anyone outside, so they may place sensitive information such as passwords, connection strings, database queries, etc. It can also be used for bypassing HttpOnly protection.


Apply input validation best practices to ensure there are no EL meta characters("${" and "#{") in the input.

External References

Go back to the Complete list of Vulnerability Checks.