CVE-2024-53299 – org.apache.wicket:wicket-core
Package
Manager: maven
Name: org.apache.wicket:wicket-core
Vulnerable Version: >=7.0.0 <8.17.0 || >=10.0.0 <10.3.0 || >=9.0.0-m1 <9.19.0
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00365 pctl0.57725
Details
Apache Wicket: An attacker can intentionally trigger a memory leak The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources. Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue.
Metadata
Created: 2025-01-23T09:31:17Z
Modified: 2025-03-11T16:24:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/01/GHSA-9cxr-76pm-j3wf/GHSA-9cxr-76pm-j3wf.json
CWE IDs: ["CWE-400"]
Alternative ID: GHSA-9cxr-76pm-j3wf
Finding: F067
Auto approve: 1