The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources.
Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Jun 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache wicket |
|
CPEs | cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:* | |
Vendors & Products |
Apache
Apache wicket |
Tue, 04 Feb 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Thu, 23 Jan 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Thu, 23 Jan 2025 08:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The request handling in the core in Apache Wicket 7.0.0 on any platform allows an attacker to create a DOS via multiple requests to server resources. Users are recommended to upgrade to versions 9.19.0 or 10.3.0, which fixes this issue. | |
Title | Apache Wicket: An attacker can intentionally trigger a memory leak | |
Weaknesses | CWE-400 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-04T18:52:25.991Z
Reserved: 2024-11-20T13:50:04.810Z
Link: CVE-2024-53299

Updated: 2025-01-23T18:03:26.240Z

Status : Analyzed
Published: 2025-01-23T09:15:07.033
Modified: 2025-06-27T19:41:44.010
Link: CVE-2024-53299

No data.