CVE-2024-27439

An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket. This issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series. Apache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected. Users are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:wicket:10.0.0:milestone1:*:*:*:*:*:*
cpe:2.3:a:apache:wicket:10.0.0:milestone2:*:*:*:*:*:*

History

27 Jun 2025, 14:43

Type Values Removed Values Added
CPE cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:wicket:10.0.0:milestone1:*:*:*:*:*:*
cpe:2.3:a:apache:wicket:10.0.0:milestone2:*:*:*:*:*:*
References () http://www.openwall.com/lists/oss-security/2024/03/19/2 - () http://www.openwall.com/lists/oss-security/2024/03/19/2 - Mailing List
References () https://lists.apache.org/thread/o825rvjjtmz3qv21ps5k7m2w9193g1lo - () https://lists.apache.org/thread/o825rvjjtmz3qv21ps5k7m2w9193g1lo - Mailing List, Vendor Advisory
First Time Apache
Apache wicket

13 Feb 2025, 18:17

Type Values Removed Values Added
Summary (en) An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket. This issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series. Apache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected. Users are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue. (en) An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket. This issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series. Apache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected. Users are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue.

06 Dec 2024, 21:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

Information

Published : 2024-03-19 11:15

Updated : 2025-06-27 14:43


NVD link : CVE-2024-27439

Mitre link : CVE-2024-27439

CVE.ORG link : CVE-2024-27439


JSON object : View

Products Affected

apache

  • wicket
CWE
CWE-352

Cross-Site Request Forgery (CSRF)

CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')