diff --git a/CVE.md b/CVE.md
index 7c95eef18ba..df18de37069 100644
--- a/CVE.md
+++ b/CVE.md
@@ -6,8 +6,9 @@
| CVE | Description |
|-------------------------------------------------------------------|-----------------|
+| [CVE-2023-49093](https://nvd.nist.gov/vuln/detail/CVE-2023-49093) | HtmlUnit suffers from a remote code execution via XSLT vulnerability on versions 3.8.0 and below. Please update to at least version 3.9.0. |
| [CVE-2023-2798](https://nvd.nist.gov/vuln/detail/CVE-2023-2798) | HtmlUnit suffers from a denial of service vulnerability on versions 2.69.0 and below. Please update to at least version 2.70.0. |
-| [CVE-2023-26119](https://nvd.nist.gov/vuln/detail/CVE-2023-26119) | HtmlUnit suffers from a remote code execution via XSTL vulnerability on versions 2.70.0 and below. Please update to at least version 3.1.0. |
-| [CVE-2022-29546](https://nvd.nist.gov/vuln/detail/CVE-2022-29546) | HtmlUnit NekoHtml Parser suffers from a remote code execution via XSTL vulnerability on versions 2.60.0 and below. Please update to at least version 2.70.0 or 3.1.0 |
+| [CVE-2023-26119](https://nvd.nist.gov/vuln/detail/CVE-2023-26119) | HtmlUnit suffers from a remote code execution via XSLT vulnerability on versions 2.70.0 and below. Please update to at least version 3.1.0. |
+| [CVE-2022-29546](https://nvd.nist.gov/vuln/detail/CVE-2022-29546) | HtmlUnit NekoHtml Parser suffers from a remote code execution via XSLT vulnerability on versions 2.60.0 and below. Please update to at least version 2.70.0 or 3.1.0 |
| [CVE-2022-28366](https://nvd.nist.gov/vuln/detail/CVE-2022-28366) | HtmlUnit NekoHtml Parser suffers from a denial of service vulnerability on versions 2.26.0 and below. Please update to at least version 2.70.0 or 3.1.0 |
| [CVE-2020-5529](https://nvd.nist.gov/vuln/detail/CVE-2020-5529) | HtmlUnit suffers from a remote code execution vulnerability (improper initialization of the Rhino engine) on versions 2.36.0 and below. Please update to at least version 3.1.0. |
diff --git a/README.md b/README.md
index 9f6d3845135..559b6adc7c1 100644
--- a/README.md
+++ b/README.md
@@ -1,6 +1,6 @@
# HtmlUnit
-Version 3.8.0 / November 18, 2023
+Version 3.9.0 / December 03, 2023
:heart: [Sponsor](https://github.com/sponsors/rbri)
@@ -38,7 +38,7 @@ Add to your `pom.xml`:
org.htmlunithtmlunit
- 3.8.0
+ 3.9.0
```
@@ -47,7 +47,7 @@ Add to your `pom.xml`:
Add to your `build.gradle`:
```groovy
-implementation group: 'org.htmlunit', name: 'htmlunit', version: '3.8.0'
+implementation group: 'org.htmlunit', name: 'htmlunit', version: '3.9.0'
```
## Vulnerabilities
@@ -122,7 +122,7 @@ Add the snapshot repository and dependency to your `pom.xml`:
org.htmlunithtmlunit
- 3.9.0-SNAPSHOT
+ 3.10.0-SNAPSHOT
@@ -141,7 +141,7 @@ repositories {
}
// ...
dependencies {
- implementation group: 'org.htmlunit', name: 'htmlunit', version: '3.9.0-SNAPSHOT'
+ implementation group: 'org.htmlunit', name: 'htmlunit', version: '3.10.0-SNAPSHOT'
// ...
}
```
@@ -185,7 +185,7 @@ Please try to keep your pull requests small (don't bundle unrelated changes) and
[![Stargazers](https://starchart.cc/HtmlUnit/htmlunit.svg)](https://starchart.cc/HtmlUnit/htmlunit)
-[1]: https://sourceforge.net/projects/htmlunit/files/htmlunit/3.8.0/ "HtmlUnit on sourceforge"
+[1]: https://sourceforge.net/projects/htmlunit/files/htmlunit/3.9.0/ "HtmlUnit on sourceforge"
[2]: https://jenkins.wetator.org/view/HtmlUnit/ "HtmlUnit CI"
[3]: https://twitter.com/HtmlUnit "https://twitter.com/HtmlUnit"
[4]: https://www.htmlunit.org "https://www.htmlunit.org"
diff --git a/pom.xml b/pom.xml
index c724a3506cf..56dd11d4176 100644
--- a/pom.xml
+++ b/pom.xml
@@ -5,7 +5,7 @@
4.0.0org.htmlunithtmlunit
- 3.9.0-SNAPSHOT
+ 3.9.0HtmlUnitGargoyle Software Inc.
diff --git a/src/changes/changes.xml b/src/changes/changes.xml
index cb65c4e5181..2517405a487 100644
--- a/src/changes/changes.xml
+++ b/src/changes/changes.xml
@@ -7,7 +7,7 @@
-
+
Upgrade commons-logging to 1.3.0
@@ -18,7 +18,7 @@
New subproject htmlunit-csp. This replaces shapesecurity/salvation.
- Enable FEATURE_SECURE_PROCESSING for the MSXML XSLProcessor.
+ Enable FEATURE_SECURE_PROCESSING for the MSXML XSLProcessor (CVE-2023-49093).
neko: fix wrong error processing for some unicode entities.
diff --git a/src/site/xdoc/index.xml b/src/site/xdoc/index.xml
index 3543f87dfe1..ba3c8d0c12f 100644
--- a/src/site/xdoc/index.xml
+++ b/src/site/xdoc/index.xml
@@ -57,9 +57,9 @@