Skip to content
CVSS 9.1 · CRITICAL

CVE-2026-40010

Missing invocation of Servlet http web request method changeSessionId after session binding can be exploited for a session fixation attack in Apache Wicket. This issue affects Apache Wicket: from 8.0.0 through 8.17.0, 9.0.0, from 10.0.0 through 10.8.0. Users are recommended to upgrade to version 10.9.0, which fixes the issue.

Ver en NVD

Análisis

Apache Wicket is vulnerable to session fixation attacks across versions 8.x through 10.x. Because the framework fails to change the session ID after authentication, attackers can hijack user accounts. Java developers using Wicket should upgrade to version 10.9.0 immediately to remediate this critical risk.

Severidad

Puntaje: 9.1(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: NONE
Tipo de falla (CWE): CWE-384

EPSS

Probabilidad de explotación (próx. 30 días): 0.0002 (0.0%)
Percentil: 5.0%
EPSS: 2026-05-06

Afecta

apache:wicket

Descripción técnica

Missing invocation of Servlet http web request method changeSessionId after session binding can be exploited for a session fixation attack in Apache Wicket. This issue affects Apache Wicket: from 8.0.0 through 8.17.0, 9.0.0, from 10.0.0 through 10.8.0. Users are recommended to upgrade to version 10.9.0, which fixes the issue.

Publicada: 6/5/2026, 10:16:20
Última modificación: 6/5/2026, 20:30:33

Referencias

InicioEventosBlogRecursosEquipo