Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2364 | The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation. Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue. |
Github GHSA |
GHSA-hhwc-gh8h-9rrp | Apache Wicket: Remote code execution via XSLT injection |
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 10 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:* cpe:2.3:a:apache:wicket:10.0.0:milestone1:*:*:*:*:*:* cpe:2.3:a:apache:wicket:10.0.0:milestone2:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T17:52:57.312Z
Reserved: 2024-05-30T12:02:13.706Z
Link: CVE-2024-36522
Updated: 2024-08-02T03:37:05.178Z
Status : Analyzed
Published: 2024-07-12T13:15:11.867
Modified: 2025-07-10T17:53:04.740
Link: CVE-2024-36522
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA