The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation.
Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.
Metrics
Affected Vendors & Products
References
History
Mon, 14 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Thu, 10 Jul 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:* cpe:2.3:a:apache:wicket:10.0.0:milestone1:*:*:*:*:*:* cpe:2.3:a:apache:wicket:10.0.0:milestone2:*:*:*:*:*:* |

Status: PUBLISHED
Assigner: apache
Published: 2024-07-12T12:13:51.884Z
Updated: 2025-02-13T17:52:57.312Z
Reserved: 2024-05-30T12:02:13.706Z
Link: CVE-2024-36522

Updated: 2024-08-02T03:37:05.178Z

Status : Analyzed
Published: 2024-07-12T13:15:11.867
Modified: 2025-07-10T17:53:04.740
Link: CVE-2024-36522

No data.