Vaadin is committed to resolving vulnerabilities to meet the needs of its customers and the broader technology community. This page describes Vaadin's policy for receiving reports related to potential security vulnerabilities in its products and services and the company’s standard practice with regards to informing customers of verified vulnerabilities.
When to contact the security emergency response team
Contact the Vaadin Product Security Incident Response Team (PSIRT) by sending email to email@example.com in the following situations:
- You have identified a potential security vulnerability with one of our products;
- You have identified a potential security vulnerability with one of our services.
To ensure confidentiality, we encourage you to encrypt any sensitive information you send to us via email. We are equipped to receive messages encrypted using S/MIME. A copy of the certificate that can be used to send encrypted email can be downloaded here.
The firstname.lastname@example.org email address is intended ONLY for the purposes of reporting product or service security vulnerabilities. It is not for technical support information on our products or services. All content other than that specific to security vulnerabilities in our products or services will be dropped. For technical and customer support inquiries, please use Vaadin Forum or create an issue in the corresponding GitHub repository.
Vaadin PSIRT will confirm receipt of your report within three business days. We will work with internal teams to verify the finding and respond in a timely manner with an update or request for additional information.
Receiving security information from Vaadin
Technical security information about our products and services is distributed through several channels.
Vaadin distributes information to customers about security vulnerabilities via the vaadin.com/security page, GitHub security advisories (where applicable) and by email to registered users. In most cases, we will issue a notice when we have identified a practical workaround or fix for the particular security vulnerability though there can be instances when we issue a notice in the absence of a workaround when the vulnerability has become widely known to the security community.
As each security vulnerability case is different, we can take alternative actions in connection with issuing security notices. Vaadin can determine to accelerate or delay the release of a notice or not issue a notice at all. Vaadin does not guarantee that security notices will be issued for any or all security issues customers can consider significant or that notices will be issued on any specific timetable.
Security-related information can also be distributed by Vaadin to public newsgroups or electronic mailing lists. This is done on a case-by-case basis, depending on how Vaadin perceives the relevance of each notice to each particular forum.
Vaadin works with the formal incident response community to distribute information. Many company security notices are distributed by regional CSIRT at the same time that they are sent through company information distribution channels.
All aspects of this process are subject to change without notice, as well as to case-by-case exceptions. No particular level of response is guaranteed for any specific issue or class of issues.
|2021-06-24||Low||CVE-2021-33604||Reflected cross-site scripting in development mode handler in Vaadin 14, 15-19|
|2021-06-24||Medium||CVE-2021-31412||Possible route enumeration in production mode via RouteNotFoundError view in Vaadin 10, 11-14, and 15-19|
|2021-05-04||Medium||CVE-2021-31411||Insecure temporary directory usage in frontend build functionality of Vaadin 14 and 15-19|
|2021-04-30||High||CVE-2021-31409||Regular expression Denial of Service (ReDoS) in EmailValidator class in V7 compatibility module in Vaadin 8|
|2021-04-22||High||CVE-2021-31410||Project sources exposure in Vaadin Designer|
|2021-04-20||Medium||CVE-2021-31408||Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19|
|2021-03-29||High||CVE-2021-31407||Server classes and resources exposure in OSGi applications using Vaadin 12-14 and 19|
|2021-03-19||Medium||CVE-2021-31406||Timing side channel vulnerability in endpoint request handler in Vaadin 15-19|
|2021-03-11||High||CVE-2021-31405||Regular expression denial of service (ReDoS) in EmailField component in Vaadin 14 and 15-17|
|2021-02-17||Medium||CVE-2021-31404||Timing side channel vulnerability in UIDL request handler in Vaadin 10, 11-14, and 15-18|
|2021-02-12||Medium||CVE-2021-31403||Timing side channel vulnerability in UIDL request handler in Vaadin 7 and 8|
|2020-11-26||Medium||CVE-2020-36321||Directory traversal in development mode handler in Vaadin 14 and 15-17|
|2020-10-08||High||CVE-2020-36320||Regular expression denial of service (ReDoS) in EmailValidator class in Vaadin 7|
|2020-04-21||Low||CVE-2020-36319||Potential sensitive data exposure in applications using Vaadin 15|
|2019-07-04||Medium||CVE-2019-25028||Stored cross-site scripting in Grid component in Vaadin 7 and 8|
|2019-05-27||Medium||CVE-2019-25027||Reflected cross-site scripting in default RouteNotFoundError view in Vaadin 10 and 11-13|
|2018-11-29||Low||CVE-2018-25007||Unauthorized client-side property update in UIDL request handler in Vaadin 10 and 11|
|2018-11-13||Notice||ADVISORY-2018-11-13||Potential deserialization of untrusted data in Vaadin 7 and 8 when JMX or RMI are enabled|
|2017-05-11||High||ADVISORY-2017-05-11||Denial of service in UIDL request handler in Vaadin 7 and 8|