CVE-2026-40010
Apache · Wicket
Apache Wicket fails to invoke the changeSessionId method after session binding, exposing the application to session fixation attacks.
Executive summary
A session fixation vulnerability in Apache Wicket allows unauthorized attackers to hijack user sessions due to improper session management.
Vulnerability
The application does not properly update the session identifier upon authentication or session binding. This allows an attacker to potentially fix a session ID and hijack a victim's authenticated session.
Business impact
Session fixation can lead to total unauthorized access to user accounts, including administrative accounts, resulting in data theft and unauthorized transactions. The 9.1 CVSS score reflects the high risk of account takeover and the potential for broad impact on user security.
Remediation
Immediate Action: Upgrade to Apache Wicket version 10.9.0 or the latest recommended release for your specific branch.
Proactive Monitoring: Audit application logs for suspicious session activity or frequent session ID reuse patterns.
Compensating Controls: Implement strict session timeout policies and ensure that all sensitive traffic is protected by HTTPS with the Secure cookie flag enabled.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Addressing this vulnerability is essential for maintaining user trust and security. Administrators should update their dependencies as soon as possible to ensure that session identifiers are correctly rotated upon authentication.