Vaadin

Vaadin

26 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.69%
  • Veröffentlicht 10.03.2026 12:08:48
  • Zuletzt bearbeitet 11.03.2026 13:53:20

An authentication bypass vulnerability exists in Vaadin 14.0.0 through 14.14.0, 23.0.0 through 23.6.6, 24.0.0 through 24.9.7 and 25.0.0 through 25.0.1, applications using Spring Security due to inconsistent path pattern matching of reserved framework...

  • EPSS 0.07%
  • Veröffentlicht 10.03.2026 12:08:30
  • Zuletzt bearbeitet 16.03.2026 14:19:31

Specially crafted ZIP archives can escape the intended extraction directory during Node.js download and extraction in Vaadin 14.2.0 through 14.14.0, 15.0.0 through 23.6.6, 24.0.0 through 24.9.8, and 25.0.0 through 25.0.2. Vaadin’s build process can...

  • EPSS 0.02%
  • Veröffentlicht 05.01.2026 07:52:56
  • Zuletzt bearbeitet 15.04.2026 00:35:42

Action captions in Vaadin accept HTML by default but were not sanitized, potentially allowing Cross-site Scripting (XSS) if caption content is derived from user input. In Vaadin Framework 7 and 8, the Action class is a general-purpose class that may...

  • EPSS 0.09%
  • Veröffentlicht 04.09.2025 06:15:47
  • Zuletzt bearbeitet 15.04.2026 00:35:42

When the Vaadin Upload's start listener is used to validate metadata about an incoming upload, it is possible to bypass the upload validation. Users of affected versions should apply the following mitigation or upgrade. Releases that have fixed th...

  • EPSS 0.29%
  • Veröffentlicht 22.06.2023 13:15:09
  • Zuletzt bearbeitet 21.11.2024 07:49:37

Possible information disclosure in Vaadin 10.0.0 to 10.0.23, 11.0.0 to 14.10.1, 15.0.0 to 22.0.28, 23.0.0 to 23.3.13, 24.0.0 to 24.0.6, 24.1.0.alpha1 to 24.1.0.rc2, resulting in potential information disclosure of class and method names in RPC respon...

  • EPSS 0.23%
  • Veröffentlicht 22.06.2023 13:15:09
  • Zuletzt bearbeitet 21.11.2024 07:49:37

When adding non-visible components to the UI in server side, content is sent to the browser in Vaadin 10.0.0 through 10.0.22, 11.0.0 through 14.10.0, 15.0.0 through 22.0.28, 23.0.0 through 23.3.12, 24.0.0 through 24.0.5 and 24.1.0.alpha1 to 24.1.0.be...

  • EPSS 0.27%
  • Veröffentlicht 24.05.2022 15:15:08
  • Zuletzt bearbeitet 21.11.2024 06:59:20

The default configuration of a TreeGrid component uses Object::toString as a key on the client-side and server communication in Vaadin 14.8.5 through 14.8.9, 22.0.6 through 22.0.14, 23.0.0.beta2 through 23.0.8 and 23.1.0.alpha1 through 23.1.0.alpha4,...

Exploit
  • EPSS 0.3%
  • Veröffentlicht 02.11.2021 10:15:07
  • Zuletzt bearbeitet 21.11.2024 06:09:11

Missing output sanitization in test sources in org.webjars.bowergithub.vaadin:vaadin-menu-bar versions 1.0.0 through 1.2.0 (Vaadin 14.0.0 through 14.4.4) allows remote attackers to execute malicious JavaScript in browser by opening crafted URL

  • EPSS 0.21%
  • Veröffentlicht 13.10.2021 11:15:07
  • Zuletzt bearbeitet 21.11.2024 06:09:11

Missing check in DataCommunicator class in com.vaadin:vaadin-server versions 8.0.0 through 8.14.0 (Vaadin 8.0.0 through 8.14.0) allows authenticated network attacker to cause heap exhaustion by requesting too many rows of data.

  • EPSS 0.05%
  • Veröffentlicht 24.06.2021 12:15:08
  • Zuletzt bearbeitet 21.11.2024 06:09:11

URL encoding error in development mode handler in com.vaadin:flow-server versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening...