CVE-2026-40010

Apache · Wicket

Apache Wicket fails to invoke the changeSessionId method after session binding, exposing the application to session fixation attacks.

Executive summary

A session fixation vulnerability in Apache Wicket allows unauthorized attackers to hijack user sessions due to improper session management.

Vulnerability

The application does not properly update the session identifier upon authentication or session binding. This allows an attacker to potentially fix a session ID and hijack a victim's authenticated session.

Business impact

Session fixation can lead to total unauthorized access to user accounts, including administrative accounts, resulting in data theft and unauthorized transactions. The 9.1 CVSS score reflects the high risk of account takeover and the potential for broad impact on user security.

Remediation

Immediate Action: Upgrade to Apache Wicket version 10.9.0 or the latest recommended release for your specific branch.

Proactive Monitoring: Audit application logs for suspicious session activity or frequent session ID reuse patterns.

Compensating Controls: Implement strict session timeout policies and ensure that all sensitive traffic is protected by HTTPS with the Secure cookie flag enabled.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Addressing this vulnerability is essential for maintaining user trust and security. Administrators should update their dependencies as soon as possible to ensure that session identifiers are correctly rotated upon authentication.