- Content-Security-Policy (CSP) Set to Unsafe Values
- v-curdate and v-wn Reported as CSRF Tokens
- Cross-Site Request Forgery (CSRF) when Fetching Static Resources
- Authentication Bypass when Fetching Static Resources
- Temporary File Download
- Oracle Log File Information Disclosure
- Content Type Incorrectly Stated
- Open Redirection – DOM-Based
- Enabling X-Frame-Options
From time to time, Vaadin users perform security tests on the framework and report issues they find. Most of the time, the issues are false positives. The following is a list of commonly reported false positives and why they are false.
script-src 'unsafe-inline' 'unsafe-eval' and
style-src 'unsafe-inline' are required during Vaadin application start, that is, the bootstrap process.
The bootstrap process that starts the application loads the widget set which is the client-side engine part of the application.
The widget set is a static resource.
After it’s loaded, the client-side engine needs to be started using
Hence, these settings are architectural limitations in Vaadin, so that the framework can start its client-side engine in the browser.
Reported as: Missing or insecure “Content-Security-Policy” header
These values aren’t used as Cross-Site Request Forgery (CSRF) tokens, and they aren’t processed in a way that would let an attacker compromise the application state.
Vaadin uses its own CSRF scheme.
Many tools report a CSRF vulnerability when Vaadin fetches static resources. These requests can’t change the application state. Here is a list of resources that are safe to fetch without a CSRF token:
widget set files (such as
Reported as: Authentication Bypass Using HTTP Verb Tampering
Some tools mark downloading the
vaadinBootstrap.js file as an issue.
This file is a required part of starting the application, and is a static resource.
Some tools that check for this don’t check the content of the response, only the response status. Vaadin doesn’t send server log files to the client, even though the response status is set to 200.
This happens when Vaadin sends user events to the server and receives JSON data back.
The response content type is
The data returned from the server is never treated as a script on the client, so there is no security risk here.
This issue is reported because
vaadinBootstrap.js indeed opens a new HTTP request.
This is done to fetch the initial application state.
On first request to an application URL, Vaadin replies with the bootstrap file, which, in turn loads the theme, widget set, and application state.
The way this request is done can’t be used by an attacker to modify the application state. Hence, this is a false positive.
The X-Frame-Options are a way for web pages or applications to tell the browser that they shouldn’t be run inside frames (inside another page). This is done to try to ensure that these sites aren’t wrapped in malicious pages where attackers can intercept user actions.
Vaadin doesn’t automatically set the
X-Frame-Options HTTP header, because many times applications need to run inside frames.
Developers can set this header either in their server options or by using the Java Servlet API (for example, using the Vaadin BootstrapListener or creating a Servlet Filter).