a rough idea of what is happening here - this is something like sql injection, but for jsp pages. if you use un-sanitized data in a jsp page, evaluated via spring's expression language, then you may execute code, provided by users, on the server.<p>(expression language can be used elsewhere, but it's not so common and much less likely to received user-supplied parameters)<p>also, this article <a href="http://www.h-online.com/open/news/item/The-ghost-of-a-Spring-Framework-bug-haunts-old-code-1786850.html" rel="nofollow">http://www.h-online.com/open/news/item/The-ghost-of-a-Spring...</a> is much clearer about affected versions (3.0.5 and below are bad; 3.0.6 can be fixed via config; 3.1 is ok)