High severity8.8NVD Advisory· Published Oct 3, 2017· Updated May 13, 2026
CVE-2016-6806
CVE-2016-6806
Description
Apache Wicket 6.x before 6.25.0, 7.x before 7.5.0, and 8.0.0-M1 provide a CSRF prevention measure that fails to discover some cross origin requests. The mitigation is to not only check the Origin HTTP header, but also take the Referer HTTP header into account when no Origin was provided. Furthermore, not all Wicket server side targets were subjected to the CSRF check. This was also fixed.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.wicket:wicket-coreMaven | >= 6.20.0, < 6.25.0 | 6.25.0 |
org.apache.wicket:wicket-coreMaven | >= 7.0.0, < 7.5.0 | 7.5.0 |
org.apache.wicket:wicket-coreMaven | >= 8.0.0-M1, < 8.0.0-M2 | 8.0.0-M2 |
Affected products
1- Apache Software Foundation/Apache Wicketv5Range: 6.20.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-xc66-mg8r-q6r5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2016-6806ghsaADVISORY
- lists.apache.org/thread.html/074b72585f4b7c6adda1af52aecbfe1be23c6d6f5bb9382270f059cd@%3Cannounce.apache.org%3EghsaWEB
- lists.apache.org/thread.html/074b72585f4b7c6adda1af52aecbfe1be23c6d6f5bb9382270f059cd%40%3Cannounce.apache.org%3Envd
News mentions
0No linked articles in our index yet.