-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.wicket:wicket-core | maven | >= 10.0.0, < 10.3.0 | 10.3.0 |
| org.apache.wicket:wicket-core | maven | >= 7.0.0, < 8.17.0 | 8.17.0 |
| org.apache.wicket:wicket-core | maven | >= 9.0.0-M1, < 9.19.0 | 9.19.0 |
The vulnerability stems from uncontrolled resource consumption during request handling. The patch notes highlight fixes related to resource URL generation (WICKET-7024) and sanitization extensibility (WICKET-7137). ResourceReference#getResourceUrl() is a core method for generating resource URLs, and improper sanitization/cleanup in this process could cause memory retention. While no direct code diff is available, the CWE-400 classification and patch context strongly implicate resource URL management as the vulnerable area.
A Semantic Attack on Google Gemini - Read the Latest Research