The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation.
Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.
Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-2364 | The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation. Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue. |
Github GHSA |
GHSA-hhwc-gh8h-9rrp | Apache Wicket: Remote code execution via XSLT injection |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 10 Jul 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:* cpe:2.3:a:apache:wicket:10.0.0:milestone1:*:*:*:*:*:* cpe:2.3:a:apache:wicket:10.0.0:milestone2:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-13T17:52:57.312Z
Reserved: 2024-05-30T12:02:13.706Z
Link: CVE-2024-36522
Updated: 2024-08-02T03:37:05.178Z
Status : Analyzed
Published: 2024-07-12T13:15:11.867
Modified: 2025-07-10T17:53:04.740
Link: CVE-2024-36522
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA