2.3
CVE-2026-2741
- EPSS 0.07%
- Veröffentlicht 10.03.2026 12:08:30
- Zuletzt bearbeitet 16.03.2026 14:19:31
- Quelle security@vaadin.com
- CVE-Watchlists
- Unerledigt
Specially crafted ZIP archives can escape the intended extraction directory during Node.js download and extraction in Vaadin 14.2.0 through 14.14.0, 15.0.0 through 23.6.6, 24.0.0 through 24.9.8, and 25.0.0 through 25.0.2. Vaadin’s build process can automatically download and extract Node.js if it is not installed locally. If an attacker can intercept or control this download via DNS hijacking, a MITM attack, a compromised mirror, or a supply chain attack, they can serve a malicious archive containing path traversal sequences that write files outside the intended extraction directory. Users of affected versions should use a globally preinstalled Node.js version compatible with their Vaadin version, or upgrade as follows: 14.2.0-14.14.0 to 14.14.1, 15.0.0-23.6.6 to 23.6.7, 24.0.0-24.9.8 to 24.9.9, and 25.0.0-25.0.2 to 25.0.3 or newer. Please note that Vaadin versions 10-13 and 15-22 are no longer supported and you should update either to the latest 14, 23, 24, 25 version.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Herstellervaadin
≫
Produkt
vaadin
Default Statusunaffected
Version <=
14.14.0
Version
14.2.0
Status
affected
Version <=
23.6.6
Version
15.0.0
Status
affected
Version <=
24.9.8
Version
24.0.0
Status
affected
Version <=
25.0.2
Version
25.0.0
Status
affected
Herstellervaadin
≫
Produkt
flow
Default Statusunaffected
Version <=
2.13.0
Version
2.2.0
Status
affected
Version <=
23.6.7
Version
3.0.0
Status
affected
Version <=
24.9.9
Version
24.0.0
Status
affected
Herstellervaadin
≫
Produkt
flow
Default Statusunaffected
Version <=
25.0.3
Version
25.0.0
Status
affected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.218 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@vaadin.com | 2.3 | 0 | 0 |
CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:L/U:Amber
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.