{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T05:47:30.418","vulnerabilities":[{"cve":{"id":"CVE-2024-36522","sourceIdentifier":"security@apache.org","published":"2024-07-12T13:15:11.867","lastModified":"2025-07-10T17:53:04.740","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration of XSLTResourceStream.java is vulnerable to remote code execution via XSLT injection when processing input from an untrusted source without validation.\nUsers are recommended to upgrade to versions 10.1.0, 9.18.0 or 8.16.0, which fix this issue."},{"lang":"es","value":"La configuración predeterminada de XSLTResourceStream.java es vulnerable a la ejecución remota de código mediante inyección XSLT cuando se procesa entrada de una fuente que no es de confianza sin validación. Se recomienda a los usuarios actualizar a las versiones 10.1.0, 9.18.0 u 8.16.0, que solucionan este problema."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@apache.org","type":"Secondary","description":[{"lang":"en","value":"CWE-74"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.16.0","matchCriteriaId":"DEED7F9D-5919-4A11-9086-100C03EDE51C"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:wicket:*:*:*:*:*:*:*:*","versionStartIncluding":"9.0.0","versionEndExcluding":"9.18.0","matchCriteriaId":"4FCE2526-59E6-4E84-9CE2-CDADBE20FFAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:wicket:10.0.0:milestone1:*:*:*:*:*:*","matchCriteriaId":"9365B852-58AE-46B0-8EA5-41AB42E3BC40"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:wicket:10.0.0:milestone2:*:*:*:*:*:*","matchCriteriaId":"AFEF17BD-48F1-4CAF-A195-45EE63001E12"}]}]}],"references":[{"url":"http://www.openwall.com/lists/oss-security/2024/07/12/2","source":"security@apache.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc","source":"security@apache.org","tags":["Mailing List","Vendor Advisory"]},{"url":"http://www.openwall.com/lists/oss-security/2024/07/12/2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://lists.apache.org/thread/w613qh7yors840pbx00l1pq6wkl9jzkc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Vendor Advisory"]}]}}]}