CVE-2024-36522

The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation. Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:wicket:10.0.0:milestone1:*:*:*:*:*:*
cpe:2.3:a:apache:wicket:10.0.0:milestone2:*:*:*:*:*:*

History

10 Jul 2025, 17:53

Type Values Removed Values Added
First Time Apache
Apache wicket
References () http://www.openwall.com/lists/oss-security/2024/07/12/2 - () http://www.openwall.com/lists/oss-security/2024/07/12/2 - Mailing List, Third Party Advisory
References () https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc - () https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc - Mailing List, Vendor Advisory
CPE cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:wicket:10.0.0:milestone1:*:*:*:*:*:*
cpe:2.3:a:apache:wicket:10.0.0:milestone2:*:*:*:*:*:*

Information

Published : 2024-07-12 13:15

Updated : 2025-07-10 17:53


NVD link : CVE-2024-36522

Mitre link : CVE-2024-36522

CVE.ORG link : CVE-2024-36522


JSON object : View

Products Affected

apache

  • wicket
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')