CVE-2024-36522

Source
https://cve.org/CVERecord?id=CVE-2024-36522
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36522.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-36522
Aliases
Published
2024-07-12T13:15:11.867Z
Modified
2026-02-13T16:31:37.113656Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation. Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.

References

Affected packages

Git / github.com/apache/wicket

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-36522.json"