The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation.
Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2024/07/12/2 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc | Mailing List Vendor Advisory |
http://www.openwall.com/lists/oss-security/2024/07/12/2 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc | Mailing List Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
10 Jul 2025, 17:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/07/12/2 - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc - Mailing List, Vendor Advisory | |
First Time |
Apache
Apache wicket |
|
CPE | cpe:2.3:a:apache:wicket:10.0.0:milestone1:*:*:*:*:*:* cpe:2.3:a:apache:wicket:10.0.0:milestone2:*:*:*:*:*:* cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:* |
21 Nov 2024, 09:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2024/07/12/2 - | |
References | () https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc - |
01 Aug 2024, 13:52
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
Summary |
|
12 Jul 2024, 16:34
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-12 13:15
Updated : 2025-07-10 17:53
NVD link : CVE-2024-36522
Mitre link : CVE-2024-36522
CVE.ORG link : CVE-2024-36522
JSON object : View
Products Affected
apache
- wicket
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')