2026-05-06 8:34CVE-2026-40010apache
PUBLISHED5.2

Apache Wicket: possible session fixation using AuthenticatedWebSession

Missing invocation of Servlet http web request method changeSessionId after session binding can be exploited for a session fixation attack in Apache Wicket.

This issue affects Apache Wicket: from 8.0.0 through 8.17.0, 9.0.0, from 10.0.0 through 10.8.0.

Users are recommended to upgrade to version 10.9.0, which fixes the issue.

Problem type

  • Posssible session fixation attack in Apache Wicket.

Affected products

Apache Software Foundation

Apache Wicket

<= 10.8.0 - AFFECTED

<= 8.17.0 - AFFECTED

<= 9.22.0 - AFFECTED

References

JSON source

https://cveawg.mitre.org/api/cve/CVE-2026-40010
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2026-40010",
    "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
    "assignerShortName": "apache",
    "dateUpdated": "2026-05-06T09:51:10.306Z",
    "dateReserved": "2026-04-08T09:57:08.052Z",
    "datePublished": "2026-05-06T08:34:30.480Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
        "shortName": "apache",
        "dateUpdated": "2026-05-06T08:34:30.480Z"
      },
      "title": "Apache Wicket: possible session fixation using AuthenticatedWebSession",
      "descriptions": [
        {
          "lang": "en",
          "value": "Missing invocation of Servlet http web request method changeSessionId after session binding can be exploited for a session fixation attack in Apache Wicket.\n\nThis issue affects Apache Wicket: from 8.0.0 through 8.17.0, 9.0.0, from 10.0.0 through 10.8.0.\n\nUsers are recommended to upgrade to version 10.9.0, which fixes the issue.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "<p>Missing invocation of Servlet http web request method changeSessionId after session binding can be exploited for a&nbsp;session fixation attack in Apache Wicket.</p><p>This issue affects Apache Wicket: from 8.0.0 through 8.17.0, 9.0.0, from 10.0.0 through 10.8.0.</p><p>Users are recommended to upgrade to version 10.9.0, which fixes the issue.</p><br>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "Apache Software Foundation",
          "product": "Apache Wicket",
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "10.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "10.8.0"
            },
            {
              "version": "8.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "8.17.0"
            },
            {
              "version": "9.0.0",
              "status": "affected",
              "versionType": "semver",
              "lessThanOrEqual": "9.22.0"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Posssible session fixation attack in Apache Wicket."
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://lists.apache.org/thread/61wsc0xdtfd5oozojfx7by9w3jwgkmv1",
          "tags": [
            "vendor-advisory"
          ]
        }
      ],
      "metrics": [
        {}
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE",
          "dateUpdated": "2026-05-06T09:51:10.306Z"
        },
        "title": "CVE Program Container",
        "references": [
          {
            "url": "http://www.openwall.com/lists/oss-security/2026/05/06/1"
          }
        ]
      }
    ]
  }
}