CVE-2024-36522

EUVD-2024-2364
The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation.
Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.
Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 92%
Affected Products (NVD)
VendorProductVersion
apachewicket
8.0.0 ≤
𝑥
< 8.16.0
apachewicket
9.0.0 ≤
𝑥
< 9.18.0
apachewicket
10.0.0:milestone1
apachewicket
10.0.0:milestone2
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
apachewicket
10.0.0-m1 ≤
𝑥
≤ 10.0.0
ADP
apachewicket
8.0.0 ≤
𝑥
≤ 8.15.0
ADP
apachewicket
9.0.0 ≤
𝑥
≤ 9.17.0
ADP