The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources.
Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue.
CVSS
No CVSS.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2025/01/22/12 | Mailing List Third Party Advisory |
https://lists.apache.org/thread/gyp2ht00c62827y0379lxh5dbx3hhho5 | Mailing List Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
27 Jun 2025, 19:41
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:* | |
References | () https://lists.apache.org/thread/gyp2ht00c62827y0379lxh5dbx3hhho5 - Mailing List, Vendor Advisory | |
References | () http://www.openwall.com/lists/oss-security/2025/01/22/12 - Mailing List, Third Party Advisory | |
First Time |
Apache wicket
Apache |
23 Jan 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
References |
|
23 Jan 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-23 09:15
Updated : 2025-06-27 19:41
NVD link : CVE-2024-53299
Mitre link : CVE-2024-53299
JSON object : View
Products Affected
apache
- wicket
CWE
No CWE.