Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2024-27439

An error in the evaluation of the fetch metadata headers could allow a bypass of the CSRF protection in Apache Wicket. This issue affects Apache Wicket: from 9.1.0 through 9.16.0, and the milestone releases for the 10.0 series. Apache Wicket 8.x does not support CSRF protection via the fetch metadata headers and as such is not affected. Users are recommended to upgrade to version 9.17.0 or 10.0.0, which fixes the issue.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 45.0%
CVSS Severity
CVSS v3 Score 6.5
Products affected by CVE-2024-27439
  • Apache » Wicket » Version: 10.0.0
    cpe:2.3:a:apache:wicket:10.0.0
  • Apache » Wicket » Version: 9.1.0
    cpe:2.3:a:apache:wicket:9.1.0
  • Apache » Wicket » Version: 9.10.0
    cpe:2.3:a:apache:wicket:9.10.0
  • Apache » Wicket » Version: 9.11.0
    cpe:2.3:a:apache:wicket:9.11.0
  • Apache » Wicket » Version: 9.12.0
    cpe:2.3:a:apache:wicket:9.12.0
  • Apache » Wicket » Version: 9.13.0
    cpe:2.3:a:apache:wicket:9.13.0
  • Apache » Wicket » Version: 9.14.0
    cpe:2.3:a:apache:wicket:9.14.0
  • Apache » Wicket » Version: 9.15.0
    cpe:2.3:a:apache:wicket:9.15.0
  • Apache » Wicket » Version: 9.16.0
    cpe:2.3:a:apache:wicket:9.16.0
  • Apache » Wicket » Version: 9.2.0
    cpe:2.3:a:apache:wicket:9.2.0
  • Apache » Wicket » Version: 9.3.0
    cpe:2.3:a:apache:wicket:9.3.0
  • Apache » Wicket » Version: 9.4.0
    cpe:2.3:a:apache:wicket:9.4.0
  • Apache » Wicket » Version: 9.5.0
    cpe:2.3:a:apache:wicket:9.5.0
  • Apache » Wicket » Version: 9.6.0
    cpe:2.3:a:apache:wicket:9.6.0
  • Apache » Wicket » Version: 9.7.0
    cpe:2.3:a:apache:wicket:9.7.0
  • Apache » Wicket » Version: 9.8.0
    cpe:2.3:a:apache:wicket:9.8.0
  • Apache » Wicket » Version: 9.9.0
    cpe:2.3:a:apache:wicket:9.9.0
  • Apache » Wicket » Version: 9.9.1
    cpe:2.3:a:apache:wicket:9.9.1


Contact Us

Shodan ® - All rights reserved