Apache Wicket sessionfixation via missing changeSessionId (v8.0.08.17.0,9.0.0,10.0.010.8.0)
CVE-2026-40010 Published on May 6, 2026
Apache Wicket: possible session fixation using AuthenticatedWebSession
Missing invocation of Servlet http web request method changeSessionId after session binding can be exploited for a session fixation attack in Apache Wicket.
This issue affects Apache Wicket: from 8.0.0 through 8.17.0, 9.0.0, from 10.0.0 through 10.8.0.
Users are recommended to upgrade to version 10.9.0, which fixes the issue.
Vulnerability Analysis
CVE-2026-40010 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Type
Session Fixation
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.
Products Associated with CVE-2026-40010
Want to know whenever a new CVE is published for Apache Wicket? stack.watch will email you.
Affected Versions
Apache Software Foundation Apache Wicket:- Version 10.0.0, <= 10.8.0 is affected.
- Version 8.0.0, <= 8.17.0 is affected.
- Version 9.0.0, <= 9.22.0 is affected.