VYPR
Low severityNVD Advisory· Published Jun 22, 2023· Updated Dec 5, 2024

CVE-2023-25500

CVE-2023-25500

Description

Possible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in potential information disclosure of class and method names in RPC responses by sending modified requests.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
com.vaadin:flow-serverMaven
>= 1.0.0, < 1.0.211.0.21
com.vaadin:flow-serverMaven
>= 1.1.0, < 2.9.32.9.3
com.vaadin:flow-serverMaven
>= 3.0.0, < 9.1.29.1.2
com.vaadin:flow-serverMaven
>= 23.0.0, < 23.3.1323.3.13
com.vaadin:flow-serverMaven
>= 24.0.0, < 24.0.924.0.9
com.vaadin:flow-serverMaven
>= 24.1.alpha1, < 24.1.024.1.0
com.vaadin:vaadinMaven
>= 10.0.0, < 10.0.2410.0.24
com.vaadin:vaadinMaven
>= 11.0.0, < 14.10.214.10.2
com.vaadin:vaadinMaven
>= 15.0.0, < 22.1.022.1.0
com.vaadin:vaadinMaven
>= 23.0.0, < 23.3.1423.3.14
com.vaadin:vaadinMaven
>= 24.0.0, < 24.0.724.0.7
com.vaadin:vaadinMaven
>= 24.1.0.alpha1, < 24.1.024.1.0

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.