Apache Wicket
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Apache Wicket.
By the Year
In 2026 there have been 4 vulnerabilities in Apache Wicket with an average score of 7.3 out of ten. Last year, in 2025 Wicket had 1 security vulnerability published. That is, 3 more vulnerabilities have already been reported in 2026 as compared to last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 4 | 7.30 |
| 2025 | 1 | 0.00 |
| 2024 | 2 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 0 | 0.00 |
| 2021 | 1 | 7.50 |
| 2020 | 1 | 0.00 |
It may take a day or so for new Wicket vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Apache Wicket Security Vulnerabilities
Apache Wicket sessionfixation via missing changeSessionId (v8.0.08.17.0,9.0.0,10.0.010.8.0)
CVE-2026-40010
9.1 - Critical
- May 06, 2026
Missing invocation of Servlet http web request method changeSessionId after session binding can be exploited for a session fixation attack in Apache Wicket. This issue affects Apache Wicket: from 8.0.0 through 8.17.0, 9.0.0, from 10.0.0 through 10.8.0. Users are recommended to upgrade to version 10.9.0, which fixes the issue.
Session Fixation
Apache Wicket 8.0-8.17,9.0,10.0-10.8 XSS Vulnerability
CVE-2026-42509
6.1 - Medium
- May 06, 2026
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Wicket. This issue affects Apache Wicket: from 8.0.0 through 8.17.0, 9.0.0, from 10.0.0 through 10.8.0. Users are recommended to upgrade to version 10.9.0, which fixes the issue.
XSS
Apache Wicket 8-10: Sensitive Info Exposure (CVE-2026-43646)
CVE-2026-43646
7.5 - High
- May 06, 2026
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Wicket. This issue affects Apache Wicket: from 8.0.0 through 8.17.0, from 9.0.0 through 9.22.0, from 10.0.0 through 10.8.0. Users are recommended to upgrade to version 10.9.0, which fixes the issue.
Information Disclosure
Apache Wicket <10.9.0 File Upload Path Traversal via unsanitized uploadFieldId
CVE-2026-43975
6.5 - Medium
- May 06, 2026
FolderUploadsFileManager in Apache Wicket does not validate or sanitize the uploadFieldId parameter or the clientFileName before constructing file paths, allowing an unauthenticated attacker to write arbitrary files outside the intended upload directory or read files from arbitrary locations on the server. This issue affects Apache Wicket: from 8.0.0 through 8.17.0, from 9.0.0 through 9.22.0, from 10.0.0 through 10.8.0. Users are recommended to upgrade to version 10.9.0, which fixes the issue.
Directory traversal
Apache Wicket 7.0.0 Core DOS via Multiple Requests
CVE-2024-53299
- January 23, 2025
The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources. Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue.
Resource Exhaustion
Apache Wicket RCE via XSLT Injection in XSLTResourceStream
CVE-2024-36522
- July 12, 2024
The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation. Users are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue.
Injection
Apache Wicket CSRF Bypass via Fetch Meta Headers (9.16.0,10.0.x)
CVE-2024-27439
- March 19, 2024
An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket. This issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series. Apache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected. Users are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue.
Session Riding
A DNS proxy and possible amplification attack vulnerability in WebClientInfo of Apache Wicket
CVE-2021-23937
7.5 - High
- May 25, 2021
A DNS proxy and possible amplification attack vulnerability in WebClientInfo of Apache Wicket allows an attacker to trigger arbitrary DNS lookups from the server when the X-Forwarded-For header is not properly sanitized. This DNS lookup can be engineered to overload an internal DNS server or to slow down request processing of the Apache Wicket application causing a possible denial of service on either the internal infrastructure or the web application itself. This issue affects Apache Wicket Apache Wicket 9.x version 9.2.0 and prior versions; Apache Wicket 8.x version 8.11.0 and prior versions; Apache Wicket 7.x version 7.17.0 and prior versions and Apache Wicket 6.x version 6.2.0 and later versions.
Information Disclosure
By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates
CVE-2020-11976
- August 11, 2020
By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5
In Apache Wicket 1.5.10 or 6.13.0
CVE-2014-0043
- October 02, 2017
In Apache Wicket 1.5.10 or 6.13.0, by issuing requests to special urls handled by Wicket, it is possible to check for the existence of particular classes in the classpath and thus check whether a third party library with a known security vulnerability is in use.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Apache Wicket or by Apache? Click the Watch button to subscribe.