<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Vaadin Security Advisories</title>
    <link>https://product-security.vaadin.com</link>
    <description>Vaadin is committed to resolving vulnerabilities to meet the needs of its customers and the broader technology community. This page describes Vaadin's policy for receiving reports related to potential security vulnerabilities in its products and services and the company’s standard practice with regards to informing customers of verified vulnerabilities.</description>
    <language>en</language>
    <pubDate>Fri, 17 Apr 2026 14:13:17 GMT</pubDate>
    <dc:date>2026-04-17T14:13:17Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Vaadin Flow and the axios npm supply-chain compromise</title>
      <link>https://product-security.vaadin.com/2026-04-17</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/2026-04-17" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-high.png" alt="Vaadin Flow and the axios npm supply-chain compromise" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;p&gt;On March 31, 2026, compromised versions of the popular axios HTTP client library (1.14.1 and 0.30.4) were published to NPM&amp;nbsp;via a hijacked maintainer account. The malicious versions injected &lt;span style="font-family: 'Andale Mono', AndaleMono, 'Lucida Console', monospace;"&gt;plain-crypto-js@4.2.1&lt;/span&gt;, a cross-platform RAT dropper that connected to a command-and-control server. The compromised packages were live for approximately three hours (00:21 to 03:29 UTC) before NPM removed them from the registry.&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;No Vaadin packages, bundles, or build artifacts were affected by this incident.&lt;/span&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/2026-04-17" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-high.png" alt="Vaadin Flow and the axios npm supply-chain compromise" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;p&gt;On March 31, 2026, compromised versions of the popular axios HTTP client library (1.14.1 and 0.30.4) were published to NPM&amp;nbsp;via a hijacked maintainer account. The malicious versions injected &lt;span style="font-family: 'Andale Mono', AndaleMono, 'Lucida Console', monospace;"&gt;plain-crypto-js@4.2.1&lt;/span&gt;, a cross-platform RAT dropper that connected to a command-and-control server. The compromised packages were live for approximately three hours (00:21 to 03:29 UTC) before NPM removed them from the registry.&lt;br&gt;&lt;br&gt;&lt;span style="font-weight: bold;"&gt;No Vaadin packages, bundles, or build artifacts were affected by this incident.&lt;/span&gt;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1840687&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fproduct-security.vaadin.com%2F2026-04-17&amp;amp;bu=https%253A%252F%252Fproduct-security.vaadin.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Fri, 17 Apr 2026 14:12:01 GMT</pubDate>
      <author>manolo@vaadin.com (Manuel Carrasco)</author>
      <guid>https://product-security.vaadin.com/2026-04-17</guid>
      <dc:date>2026-04-17T14:12:01Z</dc:date>
    </item>
    <item>
      <title>CVE-2026-2742: Unauthorized Session Creation via Reserved Framework Path Access</title>
      <link>https://product-security.vaadin.com/cve-2026-2742</link>
      <description>&lt;div&gt;
 An authentication bypass vulnerability exists in Vaadin applications using Spring Security due to inconsistent path pattern matching of reserved framework paths. Accessing the `/VAADIN` endpoint without a trailing slash bypasses security filters, allowing unauthenticated users to trigger framework initialization and create sessions without proper authorization.
&lt;/div&gt; 
&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div&gt;
 An authentication bypass vulnerability exists in Vaadin applications using Spring Security due to inconsistent path pattern matching of reserved framework paths. Accessing the `/VAADIN` endpoint without a trailing slash bypasses security filters, allowing unauthenticated users to trigger framework initialization and create sessions without proper authorization.
&lt;/div&gt; 
&lt;p&gt;&lt;br&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1840687&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fproduct-security.vaadin.com%2Fcve-2026-2742&amp;amp;bu=https%253A%252F%252Fproduct-security.vaadin.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Tue, 10 Mar 2026 12:12:18 GMT</pubDate>
      <author>manolo@vaadin.com (Manuel Carrasco)</author>
      <guid>https://product-security.vaadin.com/cve-2026-2742</guid>
      <dc:date>2026-03-10T12:12:18Z</dc:date>
    </item>
    <item>
      <title>CVE-2026-2741: Zip Slip Path Traversal on Node Unpack</title>
      <link>https://product-security.vaadin.com/cve-2026-2741</link>
      <description>&lt;div&gt;
 Specially crafted ZIP archives can escape the intended extraction directory during Node.js download and extraction in Vaadin 14.2.0 through 14.14.0, 23.0.0 through 23.6.6, 24.0.0 through 24.9.8, and 25.0.0 through 25.0.2.
&lt;/div&gt; 
&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div&gt;
 Specially crafted ZIP archives can escape the intended extraction directory during Node.js download and extraction in Vaadin 14.2.0 through 14.14.0, 23.0.0 through 23.6.6, 24.0.0 through 24.9.8, and 25.0.0 through 25.0.2.
&lt;/div&gt; 
&lt;p&gt;&lt;br&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1840687&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fproduct-security.vaadin.com%2Fcve-2026-2741&amp;amp;bu=https%253A%252F%252Fproduct-security.vaadin.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Tue, 10 Mar 2026 12:11:53 GMT</pubDate>
      <author>manolo@vaadin.com (Manuel Carrasco)</author>
      <guid>https://product-security.vaadin.com/cve-2026-2741</guid>
      <dc:date>2026-03-10T12:11:53Z</dc:date>
    </item>
    <item>
      <title>CVE-2025-15022: Cross-site scripting in Action caption</title>
      <link>https://product-security.vaadin.com/cve-2025-15022</link>
      <description>&lt;div&gt; 
 &lt;div&gt;
  &lt;span&gt;Action captions in Vaadin accept HTML by default but were not sanitized, potentially allowing Cross-site Scripting (XSS) if caption content is derived from user input.&lt;/span&gt;
 &lt;/div&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div&gt; 
 &lt;div&gt;
  &lt;span&gt;Action captions in Vaadin accept HTML by default but were not sanitized, potentially allowing Cross-site Scripting (XSS) if caption content is derived from user input.&lt;/span&gt;
 &lt;/div&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;br&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1840687&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fproduct-security.vaadin.com%2Fcve-2025-15022&amp;amp;bu=https%253A%252F%252Fproduct-security.vaadin.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Mon, 05 Jan 2026 07:52:44 GMT</pubDate>
      <author>manolo@vaadin.com (Manuel Carrasco)</author>
      <guid>https://product-security.vaadin.com/cve-2025-15022</guid>
      <dc:date>2026-01-05T07:52:44Z</dc:date>
    </item>
    <item>
      <title>React 19 Server Components Critical Vulnerability (CVE-2025-55182, CVE-2025-55183, CVE-2025-55184)</title>
      <link>https://product-security.vaadin.com/advisory-2025-12-05-react-19-server-components-critical-vulnerability-cve-2025-55182</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/advisory-2025-12-05-react-19-server-components-critical-vulnerability-cve-2025-55182" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-high.png" alt="React 19 Server Components Critical Vulnerability (CVE-2025-55182, CVE-2025-55183, CVE-2025-55184)" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;p&gt;On December 3, 2025, the React team disclosed a critical remote code execution vulnerability (CVE-2025-55182, CVSS 10.0) affecting React 19 Server Components. This vulnerability has raised concerns among Vaadin users and security scanning tools.&lt;/p&gt; 
 &lt;p&gt;&lt;span style="font-weight: normal;"&gt;Update&lt;/span&gt;: On December 11 and 12, 2025, two new vulnerabilities (CVE-2025-55183, CVSS 5.3, and CVE-2025-55184, CVSS 7.5) were reported affecting React 19 Server Components. The same explanation applies to both issues.&lt;/p&gt; 
 &lt;p&gt;&lt;strong&gt;Vaadin products are NOT affected by these vulnerabilities under normal deployment configurations.&lt;/strong&gt; This advisory clarifies Vaadin's architecture and identifies the rare circumstances where action might be needed.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/advisory-2025-12-05-react-19-server-components-critical-vulnerability-cve-2025-55182" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-high.png" alt="React 19 Server Components Critical Vulnerability (CVE-2025-55182, CVE-2025-55183, CVE-2025-55184)" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;p&gt;On December 3, 2025, the React team disclosed a critical remote code execution vulnerability (CVE-2025-55182, CVSS 10.0) affecting React 19 Server Components. This vulnerability has raised concerns among Vaadin users and security scanning tools.&lt;/p&gt; 
 &lt;p&gt;&lt;span style="font-weight: normal;"&gt;Update&lt;/span&gt;: On December 11 and 12, 2025, two new vulnerabilities (CVE-2025-55183, CVSS 5.3, and CVE-2025-55184, CVSS 7.5) were reported affecting React 19 Server Components. The same explanation applies to both issues.&lt;/p&gt; 
 &lt;p&gt;&lt;strong&gt;Vaadin products are NOT affected by these vulnerabilities under normal deployment configurations.&lt;/strong&gt; This advisory clarifies Vaadin's architecture and identifies the rare circumstances where action might be needed.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1840687&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fproduct-security.vaadin.com%2Fadvisory-2025-12-05-react-19-server-components-critical-vulnerability-cve-2025-55182&amp;amp;bu=https%253A%252F%252Fproduct-security.vaadin.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Tue, 09 Dec 2025 12:07:31 GMT</pubDate>
      <author>manolo@vaadin.com (Manuel Carrasco)</author>
      <guid>https://product-security.vaadin.com/advisory-2025-12-05-react-19-server-components-critical-vulnerability-cve-2025-55182</guid>
      <dc:date>2025-12-09T12:07:31Z</dc:date>
    </item>
    <item>
      <title>ADVISORY-2025-09-26: Vaadin Flow, Hilla and the September 2025 npm supply-chain attacks</title>
      <link>https://product-security.vaadin.com/2025-09-26</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/2025-09-26" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-high.png" alt="ADVISORY-2025-09-26: Vaadin Flow, Hilla and the September 2025 npm supply-chain attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;div&gt;
   Recently two major npm supply-chain attacks have been reported, raising concerns about the safety of the broader software ecosystem, including for Vaadin users. 
  &lt;br&gt; 
  &lt;br&gt;The first incident involved compromised maintainer accounts and malicious releases of widely used packages such as 
  &lt;span style="font-family: 'Courier New', Courier, monospace;"&gt;debug&lt;/span&gt; and 
  &lt;span style="font-family: 'Courier New', Courier, monospace;"&gt;chalk&lt;/span&gt;. The second, known as 
  &lt;em&gt;Shai-Hulud&lt;/em&gt;, used poisoned package versions and a self-replicating post-install script to steal developer credentials (npm tokens, GitHub PATs, cloud keys) and republish tainted packages from victim accounts, infecting 180+ packages. In November 2025, a more aggressive second wave, Shai-Hulud 2.0, compromised 700+ packages including projects from Zapier, PostHog, and Postman, using preinstall hooks that execute even on failed installations. 
  &lt;br&gt; 
  &lt;br&gt; 
  &lt;br&gt;No Vaadin packages or bundles were affected in either attack. 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/2025-09-26" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-high.png" alt="ADVISORY-2025-09-26: Vaadin Flow, Hilla and the September 2025 npm supply-chain attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;div&gt;
   Recently two major npm supply-chain attacks have been reported, raising concerns about the safety of the broader software ecosystem, including for Vaadin users. 
  &lt;br&gt; 
  &lt;br&gt;The first incident involved compromised maintainer accounts and malicious releases of widely used packages such as 
  &lt;span style="font-family: 'Courier New', Courier, monospace;"&gt;debug&lt;/span&gt; and 
  &lt;span style="font-family: 'Courier New', Courier, monospace;"&gt;chalk&lt;/span&gt;. The second, known as 
  &lt;em&gt;Shai-Hulud&lt;/em&gt;, used poisoned package versions and a self-replicating post-install script to steal developer credentials (npm tokens, GitHub PATs, cloud keys) and republish tainted packages from victim accounts, infecting 180+ packages. In November 2025, a more aggressive second wave, Shai-Hulud 2.0, compromised 700+ packages including projects from Zapier, PostHog, and Postman, using preinstall hooks that execute even on failed installations. 
  &lt;br&gt; 
  &lt;br&gt; 
  &lt;br&gt;No Vaadin packages or bundles were affected in either attack. 
 &lt;/div&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1840687&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fproduct-security.vaadin.com%2F2025-09-26&amp;amp;bu=https%253A%252F%252Fproduct-security.vaadin.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Fri, 26 Sep 2025 09:42:57 GMT</pubDate>
      <author>manolo@vaadin.com (Manuel Carrasco)</author>
      <guid>https://product-security.vaadin.com/2025-09-26</guid>
      <dc:date>2025-09-26T09:42:57Z</dc:date>
    </item>
    <item>
      <title>CVE-2025-9467: Possibility to bypass file upload validation on the server-side</title>
      <link>https://product-security.vaadin.com/cve-2025-9467</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/cve-2025-9467" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-medium.png" alt="Medium" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;When the Vaadin Upload's start listener is used to validate metadata about an incoming upload, it is possible to bypass the upload validation.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/cve-2025-9467" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-medium.png" alt="Medium" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;When the Vaadin Upload's start listener is used to validate metadata about an incoming upload, it is possible to bypass the upload validation.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1840687&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fproduct-security.vaadin.com%2Fcve-2025-9467&amp;amp;bu=https%253A%252F%252Fproduct-security.vaadin.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Wed, 03 Sep 2025 21:00:00 GMT</pubDate>
      <author>sami.ekblad@itmill.com (Sami Ekblad)</author>
      <guid>https://product-security.vaadin.com/cve-2025-9467</guid>
      <dc:date>2025-09-03T21:00:00Z</dc:date>
    </item>
    <item>
      <title>Ingress-Nginx Admission Controller RCE Escalation</title>
      <link>https://product-security.vaadin.com/2025-03-28</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/2025-03-28" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-high.png" alt="Ingress-Nginx Admission Controller RCE Escalation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/2025-03-28" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-high.png" alt="Ingress-Nginx Admission Controller RCE Escalation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)&lt;br&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1840687&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fproduct-security.vaadin.com%2F2025-03-28&amp;amp;bu=https%253A%252F%252Fproduct-security.vaadin.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Mon, 31 Mar 2025 11:34:18 GMT</pubDate>
      <author>manolo@vaadin.com (Manuel Carrasco)</author>
      <guid>https://product-security.vaadin.com/2025-03-28</guid>
      <dc:date>2025-03-31T11:34:18Z</dc:date>
    </item>
    <item>
      <title>CVE-2023-25499: Possible information disclosure in non visible components</title>
      <link>https://product-security.vaadin.com/cve-2023-25499</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/cve-2023-25499" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-medium.png" alt="CVE-2023-25499: Possible information disclosure in non visible components" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;When adding non-visible components to the UI in server side, content is sent to the browser in Vaadin 10.0.0 through 10.0.22, 11.0.0 through 14.10.0, 15.0.0 through 22.0.28, 23.0.0 through 23.3.12, 24.0.0 through 24.0.5 and 24.1.0.alpha1 to 24.1.0.beta1, resulting in potential information disclosure.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/cve-2023-25499" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-medium.png" alt="CVE-2023-25499: Possible information disclosure in non visible components" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;When adding non-visible components to the UI in server side, content is sent to the browser in Vaadin 10.0.0 through 10.0.22, 11.0.0 through 14.10.0, 15.0.0 through 22.0.28, 23.0.0 through 23.3.12, 24.0.0 through 24.0.5 and 24.1.0.alpha1 to 24.1.0.beta1, resulting in potential information disclosure.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1840687&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fproduct-security.vaadin.com%2Fcve-2023-25499&amp;amp;bu=https%253A%252F%252Fproduct-security.vaadin.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 22 Jun 2023 12:53:42 GMT</pubDate>
      <author>sami.ekblad@itmill.com (Sami Ekblad)</author>
      <guid>https://product-security.vaadin.com/cve-2023-25499</guid>
      <dc:date>2023-06-22T12:53:42Z</dc:date>
    </item>
    <item>
      <title>Apache Commons FileUpload - DoS with excessive parts</title>
      <link>https://product-security.vaadin.com/2023-04-19</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/2023-04-19" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-high.png" alt="Apache Commons FileUpload - DoS with excessive parts" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://product-security.vaadin.com/2023-04-19" title="" class="hs-featured-image-link"&gt; &lt;img src="https://product-security.vaadin.com/hubfs/1.%20Website%20images/Product%20Security%20Reports/security-banner-high.png" alt="Apache Commons FileUpload - DoS with excessive parts" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured.&lt;br&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=1840687&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fproduct-security.vaadin.com%2F2023-04-19&amp;amp;bu=https%253A%252F%252Fproduct-security.vaadin.com&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Thu, 22 Jun 2023 12:53:25 GMT</pubDate>
      <author>sami.ekblad@itmill.com (Sami Ekblad)</author>
      <guid>https://product-security.vaadin.com/2023-04-19</guid>
      <dc:date>2023-06-22T12:53:25Z</dc:date>
    </item>
  </channel>
</rss>
