Lucene search

K
cvelistApacheCVELIST:CVE-2024-36522
HistoryJul 12, 2024 - 12:13 p.m.

CVE-2024-36522 Apache Wicket: Remote code execution via XSLT injection

2024-07-1212:13:51
CWE-74
apache
www.cve.org
20
apache wicket
xslt injection
remote code execution
cve-2024-36522
upgrade
validation

EPSS

0

Percentile

9.3%

The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation.
Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.

CNA Affected

[
  {
    "collectionURL": "https://repo.maven.apache.org/maven2",
    "defaultStatus": "unaffected",
    "packageName": "org.apache.wicket:wicket-util",
    "product": "Apache Wicket",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThanOrEqual": "10.0.0",
        "status": "affected",
        "version": "10.0.0-M1",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "9.17.0",
        "status": "affected",
        "version": "9.0.0",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "8.15.0",
        "status": "affected",
        "version": "8.0.0",
        "versionType": "semver"
      }
    ]
  }
]

EPSS

0

Percentile

9.3%

Related for CVELIST:CVE-2024-36522