The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation.
Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/07/12/2 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/07/12/2 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc | Mailing List Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
10 Jul 2025, 17:53
Type | Values Removed | Values Added |
---|---|---|
First Time |
Apache
Apache wicket |
|
References | () http://www.openwall.com/lists/oss-security/2024/07/12/2 - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc - Mailing List, Vendor Advisory | |
CPE | cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:* cpe:2.3:a:apache:wicket:10.0.0:milestone1:*:*:*:*:*:* cpe:2.3:a:apache:wicket:10.0.0:milestone2:*:*:*:*:*:* |
Information
Published : 2024-07-12 13:15
Updated : 2025-07-10 17:53
NVD link : CVE-2024-36522
Mitre link : CVE-2024-36522
CVE.ORG link : CVE-2024-36522
JSON object : View
Products Affected
apache
- wicket
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')