VYPR

Maven package

com.vaadin/flow-server

pkg:maven/com.vaadin/flow-server

Vulnerabilities (10)

  • CVE-2026-2742MedMar 10, 2026
    affected < 14.14.1fixed 14.14.1

    An authentication bypass vulnerability exists in Vaadin 14.0.0 through 14.14.0, 23.0.0 through 23.6.6, 24.0.0 through 24.9.7 and 25.0.0 through 25.0.1, applications using Spring Security due to inconsistent path pattern matching of reserved framework paths. Accessing the /VAADIN

  • CVE-2023-25500Jun 22, 2023
    affected >= 1.0.0, < 1.0.21fixed 1.0.21

    Possible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in potential information disclosure of class and method names in RPC responses by sending modified reques

  • CVE-2023-25499Jun 22, 2023
    affected >= 1.0.0, < 1.0.20fixed 1.0.20

    When adding non-visible components to the UI in server side, content is sent to the browser in Vaadin 10.0.0 through 10.0.22, 11.0.0 through 14.10.0, 15.0.0 through 22.0.28, 23.0.0 through 23.3.12, 24.0.0 through 24.0.5 and 24.1.0.alpha1 to 24.1.0.beta1, resulting in potential in

  • CVE-2021-31407Apr 23, 2021
    affected >= 1.2.0, < 2.4.8fixed 2.4.8

    Vulnerability in OSGi integration in com.vaadin:flow-server versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request.

  • CVE-2021-31406Apr 23, 2021
    affected >= 3.0.0, < 5.0.4fixed 5.0.4

    Non-constant-time comparison of CSRF tokens in endpoint request handler in com.vaadin:flow-server versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoin

  • CVE-2021-31404Apr 23, 2021
    affected >= 1.0.0, < 1.0.14fixed 1.0.14

    Non-constant-time comparison of CSRF tokens in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.13 (Vaadin 10.0.0 through 10.0.16), 1.1.0 prior to 2.0.0 (Vaadin 11 prior to 14), 2.0.0 through 2.4.6 (Vaadin 14.0.0 through 14.4.6), 3.0.0 prior to 5.0.0 (Vaa

  • CVE-2020-36321Apr 23, 2021
    affected >= 3.0.0, < 5.0.0fixed 5.0.0

    Improper URL validation in development mode handler in com.vaadin:flow-server versions 2.0.0 through 2.4.1 (Vaadin 14.0.0 through 14.4.2), and 3.0 prior to 5.0 (Vaadin 15 prior to 18) allows attacker to request arbitrary files stored outside of intended frontend resources folder.

  • CVE-2020-36319Apr 23, 2021
    affected >= 3.0.0, < 3.0.6fixed 3.0.6

    Insecure configuration of default ObjectMapper in com.vaadin:flow-server versions 3.0.0 through 3.0.5 (Vaadin 15.0.0 through 15.0.4) may expose sensitive data if the application also uses e.g. @RestController

  • CVE-2019-25027Apr 23, 2021
    affected >= 1.0.0, < 1.0.11fixed 1.0.11

    Missing output sanitization in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL

  • CVE-2018-25007Apr 23, 2021
    affected >= 1.0.0, < 1.0.6fixed 1.0.6

    Missing check in UIDL request handler in com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2) allows attacker to update element property values via crafted synchronization message.