Apache Wicket 8-10: Sensitive Info Exposure (CVE-2026-43646)
CVE-2026-43646 Published on May 6, 2026

Apache Wicket: crafted URLs can bypass PackageResourceGuard
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Wicket. This issue affects Apache Wicket: from 8.0.0 through 8.17.0, from 9.0.0 through 9.22.0, from 10.0.0 through 10.8.0. Users are recommended to upgrade to version 10.9.0, which fixes the issue.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2026-43646 is exploitable with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
NONE
Availability Impact:
NONE

Weakness Type

What is an Information Disclosure Vulnerability?

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

CVE-2026-43646 has been classified to as an Information Disclosure vulnerability or weakness.


Products Associated with CVE-2026-43646

Want to know whenever a new CVE is published for Apache Wicket? stack.watch will email you.

 

Affected Versions

Apache Software Foundation Apache Wicket: