Skip to Content
Dismiss
Innovation
A platform built for AI

Unified, automated, and ready to turn data into intelligence.

Find Out How
Dismiss
June 16-18, Las Vegas
Pure//Accelerate® 2026

Discover how to unlock the true value of your data. 

Register Now
Dismiss
NVIDIA GTC San Jose 2026
Experience the Everpure difference at GTC

March 16-19 | Booth #935
San Jose McEnery Convention Center

Schedule a Meeting

What Is Expression Language Injection?

Code injection is a critical vulnerability that allows a third party to execute code on the server-side software. Expression language injection is a type of remote code execution that discloses sensitive data from the server. The remote code executes and displays variables, passwords, functions, or code. At worst, it can give an attacker remote control of the server.

What Is Expression Language Injection?

Expression language injection is a vulnerability affecting JavaServer Pages (JSP), Active Server Pages (ASP), and other expression languages hosted on a web server. These languages are interpreted languages, so any code sent to the server is compiled during runtime of the application, as opposed to standard compiled languages with binary executable files. In an interpreted language, the code compiles on the server when a user makes a request for a page.

When an expression language (EL) application is vulnerable to expression language injection, an attacker sends crafted code to the application as input, either in the query string or in a form object. The code is compiled at runtime, and the code can then display variables, passwords, and other sensitive information. EL vulnerabilities are common in outdated versions of interpreted languages, so legacy applications should be penetration tested before deploying them to production. After a critical event, organizations need disaster recovery plans to remediate data disclosure and exploits.

How Expression Language Injection Works

Any application running an interpreted language should scrub code and special characters from input. Without scrubbing input, the application will accept code and execute it on the server. Most EL injection vulnerabilities involve JSP, so we’ll use JSP code in the following example. The snippet below is an example of a single line of code vulnerable to EL injection:

<spring:message code="${param['message']}" text=""/>

In this example, the code attribute takes a parameter containing a string. If an attacker injects code into the parameter, it will be compiled and executed on the server. Users do not see this code in their local web page, so attackers use common scripts to find EL injection vulnerabilities.

Common Vulnerabilities Leading to Expression Language Injection

Similar to any injection vulnerability, the EL injection vulnerability stems from no validation of input on the server application. Using the same example as above, the message string could be an innocent string of characters, but it could also be code. Instead of sending an innocent string, suppose the user sent the following:

${"aaaa".toString().concat(T(java.lang.Runtime).getRuntime().exec('ls -l'))}

The above input attempts to run the system command “ls -l” on the server. This command lists the files and directories in the current directory. With a list of files, an attacker could then attempt to send another command to open and display a file’s content to their window. A file could contain sensitive data such as passwords. From there, the attacker could potentially access the server and perform additional malicious actions.

Detecting Expression Language Injection

Penetration testing—both white box and black box—will detect EL injection vulnerabilities. White box testing is a method where security professionals review code for vulnerabilities. Businesses supply the code to security reviewers, and reviewers identify all code vulnerabilities in a report. It’s a common proactive approach to data protection.

Black box penetration testing uses the same form of scans and vulnerability detection as an attacker. Security professionals attack the application without knowing the code, so any validation or defenses can be tested. Gray box testing is a mix of black box and white box testing and is often a chosen method for penetration testing web applications.

Preventing Expression Language Injection

The best way to detect EL injection attacks is to validate code and remove input with specific characters. For example, input for a name field should not have “<” or “>” characters in it. Developers should use libraries built to detect these characters and remove them or drop the input and display an error to the user.

Other characters can also be malicious. In a JSP page, code snippets start with the “<%” characters and end with the “%>” characters. These characters together should be removed from input. Attackers will perform numerous combinations of malicious code to bypass detection, so the best way to detect it is to use a library built for input validation. SIEM applications can also detect exploits and provide analytics if your application is a target.

Conclusion

EL injection vulnerabilities should be treated as critical security issues. Always have your interpreted language applications tested for injection vulnerabilities and any others that could disclose sensitive data. Developers should use validation tools to detect and stop EL injection, and legacy applications using JSP and ASP should be closely monitored for attacks.

Everpure has the security infrastructure and threat monitoring in place to protect your applications from security attacks.

03/2026
Empowering Healthcare Cyber Resilience
Everpure™️ and Rubrik provide a unified cyber resilience stack specifically designedto protect healthcare infrastructure, which is a primary target for cyber threats.
Solution Brief
3 pages

Browse key resources and events

TRADESHOW
Pure//Accelerate® 2026
June 16-18, 2026 | Resorts World Las Vegas

Get ready for the most valuable event you’ll attend this year.

Register Now
PURE360 DEMOS
Explore, learn, and experience Everpure.

Access on-demand videos and demos to see what Everpure can do.

Watch Demos
VIDEO
Watch: The value of an Enterprise Data Cloud

Charlie Giancarlo on why managing data—not storage—is the future. Discover how a unified approach transforms enterprise IT operations.

Watch Now
RESOURCE
Legacy storage can’t power the future

Modern workloads demand AI-ready speed, security, and scale. Is your stack ready?

Take the Assessment
Your Browser Is No Longer Supported!

Older browsers often represent security risks. In order to deliver the best possible experience when using our site, please update to any of these latest browsers.

Personalize for Me
Steps Complete!
1
2
3
Personalize your Everpure experience
Select a challenge, or skip and build your own use case.
Future-proof virtualization strategies

Storage options for all your needs

Enable AI projects at any scale

High-performance storage for data pipelines, training, and inferencing

Protect against data loss

Cyber resilience solutions that defend your data

Reduce cost of cloud operations

Cost-efficient storage for Azure, AWS, and private clouds

Accelerate applications and database performance

Low-latency storage for application performance

Reduce data center power and space usage

Resource efficient storage to improve data center utilization

Confirm your outcome priorities
Your scenario prioritizes the selected outcomes. You can modify or choose next to confirm.
Primary
Reduce My Storage Costs
Lower hardware and operational spend.
Primary
Strengthen Cyber Resilience
Detect, protect against, and recover from ransomware.
Primary
Simplify Governance and Compliance
Easy-to-use policy rules, settings, and templates.
Primary
Deliver Workflow Automation
Eliminate error-prone manual tasks.
Primary
Use Less Power and Space
Smaller footprint, lower power consumption.
Primary
Boost Performance and Scale
Predictability and low latency at any size.
What’s your role and industry?
We've inferred your role based on your scenario. Modify or confirm and select your industry.
Select your industry
Financial services
Government
Healthcare
Education
Telecommunications
Automotive
Hyperscaler
Electronic design automation
Retail
Service provider
Transportation
Which team are you on?
Technical leadership team
Defines the strategy and the decision making process
Infrastructure and Ops team
Manages IT infrastructure operations and the technical evaluations
Business leadership team
Responsible for achieving business outcomes
Security team
Owns the policies for security, incident management, and recovery
Application team
Owns the business applications and application SLAs
Describe your ideal environment
Tell us about your infrastructure and workload needs. We chose a few based on your scenario.
Select your preferred deployment
Hosted
Dedicated off-prem
On-prem
Your data center + edge
Public cloud
Public cloud only
Hybrid
Mix of on-prem and cloud
Select the workloads you need
Databases
Oracle, SQL Server, SAP HANA, open-source

Key benefits:

  • Instant, space-efficient snapshots

  • Near-zero-RPO protection and rapid restore

  • Consistent, low-latency performance

 

AI/ML and analytics
Training, inference, data lakes, HPC

Key benefits:

  • Predictable throughput for faster training and ingest

  • One data layer for pipelines from ingest to serve

  • Optimized GPU utilization and scale
Data protection and recovery
Backups, disaster recovery, and ransomware-safe restore

Key benefits:

  • Immutable snapshots and isolated recovery points

  • Clean, rapid restore with SafeMode™

  • Detection and policy-driven response

 

Containers and Kubernetes
Kubernetes, containers, microservices

Key benefits:

  • Reliable, persistent volumes for stateful apps

  • Fast, space-efficient clones for CI/CD

  • Multi-cloud portability and consistent ops
Cloud
AWS, Azure

Key benefits:

  • Consistent data services across clouds

  • Simple mobility for apps and datasets

  • Flexible, pay-as-you-use economics

 

Virtualization
VMs, vSphere, VCF, vSAN replacement

Key benefits:

  • Higher VM density with predictable latency

  • Non-disruptive, always-on upgrades

  • Fast ransomware recovery with SafeMode™

 

Data storage
Block, file, and object

Key benefits:

  • Consolidate workloads on one platform

  • Unified services, policy, and governance

  • Eliminate silos and redundant copies

 

What other vendors are you considering or using?
Thinking...
Your personalized, guided path
Get started with resources based on your selections.