Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.vaadin/vaadin-bom
  4. ›
  5. CVE-2021-33604

CVE-2021-33604: Improper Neutralization

June 28, 2021 (updated October 5, 2021)

URL encoding error in development mode handler in com.vaadin:flow-server versions 2.0.0 through 2.6.1 (Vaadin 14.0.0 through 14.6.1), 3.0.0 through 6.0.9 (Vaadin 15.0.0 through 19.0.8) allows local user to execute arbitrary JavaScript code by opening crafted URL in browser.

References

  • github.com/advisories/GHSA-c99r-67x4-whj6
  • github.com/vaadin/flow/pull/11099
  • github.com/vaadin/platform/security/advisories/GHSA-c99r-67x4-whj6
  • nvd.nist.gov/vuln/detail/CVE-2021-33604
  • vaadin.com/security/cve-2021-33604

Code Behaviors & Features

Detect and mitigate CVE-2021-33604 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 14.0.0 up to 14.6.1, all versions starting from 15.0.0 up to 19.0.8

Fixed versions

  • 14.6.2
  • 19.0.9

Solution

Upgrade to versions 14.6.2, 19.0.9 or above.

Impact 2.5 LOW

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-707: Improper Neutralization

Source file

maven/com.vaadin/vaadin-bom/CVE-2021-33604.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:01 +0000.