Apache Software Foundation Apache Wicket vulnerabilities

6 known vulnerabilities affecting apache_software_foundation/apache_wicket.

Total CVEs
6
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH2MEDIUM3

Vulnerabilities

Page 1 of 1
CVE-2024-53299MEDIUMCVSS 6.5≥ 7.0.0, ≤ 7.18.*≥ 8.0.0-M1, ≤ 8.16.*+2 more2025-01-23
CVE-2024-53299 [MEDIUM] CWE-400 CVE-2024-53299: The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources. Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue.
cvelistv5nvd
CVE-2024-36522CRITICALCVSS 9.8≥ 10.0.0-M1, ≤ 10.0.0≥ 9.0.0, ≤ 9.17.0+1 more2024-07-12
CVE-2024-36522 [CRITICAL] CWE-74 CVE-2024-36522: The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation. Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.
cvelistv5nvd
CVE-2024-27439MEDIUMCVSS 6.5≥ 9.1.0, ≤ 9.16.0≥ 10.0.0-M1, < 10.0.02024-03-19
CVE-2024-27439 [MEDIUM] CWE-352 CVE-2024-27439: An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket. This issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series. Apache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected. Users are r
cvelistv5nvd
CVE-2021-23937HIGHCVSS 7.5≥ Apache Wicket 9.x, ≤ 9.2.0≥ Apache Wicket 8.x, ≤ 8.11.0+2 more2021-05-25
CVE-2021-23937 [HIGH] CWE-200 CVE-2021-23937: A DNS proxy and possible amplification attack vulnerability in WebClientInfo of Apache Wicket allows A DNS proxy and possible amplification attack vulnerability in WebClientInfo of Apache Wicket allows an attacker to trigger arbitrary DNS lookups from the server when the X-Forwarded-For header is not properly sanitized. This DNS lookup can be engineered to overload an internal DNS server or to slow down request processing of the Apache Wicket applica
cvelistv5nvd
CVE-2016-6806HIGHCVSS 8.8v6.20.0v6.21.0+9 more2017-10-03
CVE-2016-6806 [HIGH] CWE-352 CVE-2016-6806: Apache Wicket 6.x before 6.25.0, 7.x before 7.5.0, and 8.0.0-M1 provide a CSRF prevention measure th Apache Wicket 6.x before 6.25.0, 7.x before 7.5.0, and 8.0.0-M1 provide a CSRF prevention measure that fails to discover some cross origin requests. The mitigation is to not only check the Origin HTTP header, but also take the Referer HTTP header into account when no Origin was provided. Furthermore, not all Wicket server side targets were subjected to
cvelistv5nvd
CVE-2014-0043MEDIUMCVSS 5.3v1.5.10v6.13.02017-10-03
CVE-2014-0043 [MEDIUM] CWE-200 CVE-2014-0043: In Apache Wicket 1.5.10 or 6.13.0, by issuing requests to special urls handled by Wicket, it is poss In Apache Wicket 1.5.10 or 6.13.0, by issuing requests to special urls handled by Wicket, it is possible to check for the existence of particular classes in the classpath and thus check whether a third party library with a known security vulnerability is in use.
cvelistv5nvd