The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources. Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue.
2025-01-23T09:15:07.033
2025-06-27T19:41:44.010
Analyzed
CVSSv3.1: 6.5 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apache | wicket | ≤ 7.18.0 | Yes |
Application | apache | wicket | ≤ 8.16.0 | Yes |
Application | apache | wicket | < 9.19.0 | Yes |
Application | apache | wicket | < 10.3.0 | Yes |