Known Vulnerabilities for Tapestry by Apache

Listed below are 10 of the newest known vulnerabilities associated with "Tapestry" by "Apache".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-46366 json ** UNSUPPORTED WHEN ASSIGNED ** Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code executio... 9.8 - CRITICAL 2022-12-02 2023-11-07
CVE-2022-31781 json Apache Tapestry up to version 5.8.1 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles Conte... 7.5 - HIGH 2022-07-13 2023-08-02
CVE-2021-30638 json Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside W... 7.5 - HIGH 2021-04-27 2022-10-27
CVE-2021-27850 json A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected... 9.8 - CRITICAL 2021-04-15 2021-06-02
CVE-2020-17531 json A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" par... 9.8 - CRITICAL 2020-12-08 2023-11-07
CVE-2020-13953 json In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of t... 5.3 - MEDIUM 2020-09-30 2023-11-07
CVE-2019-10071 json The code which checks HMAC in form submissions used String.equals() for comparisons, which results in a timing side channel f... 9.8 - CRITICAL 2019-09-16 2023-11-07
CVE-2019-0207 json Tapestry processes assets `/assets/ctx` using classes chain `StaticFilesFilter -> AssetDispatcher -> ContextResource`, which ... 7.5 - HIGH 2019-09-16 2023-11-07
CVE-2019-0195 json Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloa... 9.8 - CRITICAL 2019-09-16 2023-11-07
CVE-2014-1972 json Apache Tapestry before 5.3.6 relies on client-side object storage without checking whether a client has modified an object, w... 7.8 - HIGH 2015-08-22 2023-11-07

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationApacheTapestry5.6.1
ApplicationApacheTapestry5.6.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.5.0
ApplicationApacheTapestry5.4.5
ApplicationApacheTapestry5.4.4
ApplicationApacheTapestry5.4.3
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report