The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation.
Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.
Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Thu, 10 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:* cpe:2.3:a:apache:wicket:10.0.0:milestone1:*:*:*:*:*:* cpe:2.3:a:apache:wicket:10.0.0:milestone2:*:*:*:*:*:* |

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T17:52:57.312Z
Reserved: 2024-05-30T12:02:13.706Z
Link: CVE-2024-36522

Updated: 2024-08-02T03:37:05.178Z

Status : Analyzed
Published: 2024-07-12T13:15:11.867
Modified: 2025-07-10T17:53:04.740
Link: CVE-2024-36522

No data.

No data.