{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T09:42:13.633","vulnerabilities":[{"cve":{"id":"CVE-2019-25027","sourceIdentifier":"security@vaadin.com","published":"2021-04-23T16:15:07.987","lastModified":"2024-11-21T04:39:46.430","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Missing output sanitization in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL"},{"lang":"es","value":"Una falta de un saneamiento de salida en la visualización predeterminada de la función RouteNotFoundError en com.vaadin:flow-server versiones 1.0.0 hasta 1.0.10 (Vaadin versiones 10.0.0 hasta 10.0.13) y versiones 1.1.0 hasta 1.4.2 (Vaadin versiones 11.0.0 hasta 13.0. 5), permite al atacante ejecutar JavaScript malicioso por medio de una URL diseñada"}],"metrics":{"cvssMetricV31":[{"source":"security@vaadin.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"security@vaadin.com","type":"Secondary","description":[{"lang":"en","value":"CWE-81"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.0.11","matchCriteriaId":"496EDAA4-40B8-45BD-A368-D03C8FFE3AAA"},{"vulnerable":true,"criteria":"cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*","versionStartIncluding":"1.1.0","versionEndExcluding":"1.4.3","matchCriteriaId":"F6B2ACB9-8B2E-4F8F-8CB6-565C578EB4EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*","versionStartIncluding":"10.0.0","versionEndExcluding":"10.0.14","matchCriteriaId":"58A54FE8-E0DE-403E-8D47-7E74B2E1D989"},{"vulnerable":true,"criteria":"cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"13.0.6","matchCriteriaId":"BD9FF41D-6860-4F1D-9ECD-DC4B61F78998"}]}]}],"references":[{"url":"https://github.com/vaadin/flow/pull/5498","source":"security@vaadin.com","tags":["Patch","Third Party Advisory"]},{"url":"https://vaadin.com/security/cve-2019-25027","source":"security@vaadin.com","tags":["Vendor Advisory"]},{"url":"https://github.com/vaadin/flow/pull/5498","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://vaadin.com/security/cve-2019-25027","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}