{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T04:39:23.129","vulnerabilities":[{"cve":{"id":"CVE-2021-31411","sourceIdentifier":"security@vaadin.com","published":"2021-05-05T19:15:08.777","lastModified":"2024-11-21T06:05:36.923","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Insecure temporary directory usage in frontend build functionality of com.vaadin:flow-server versions 2.0.9 through 2.5.2 (Vaadin 14.0.3 through Vaadin 14.5.2), 3.0 prior to 6.0 (Vaadin 15 prior to 19), and 6.0.0 through 6.0.5 (Vaadin 19.0.0 through 19.0.4) allows local users to inject malicious code into frontend resources during application rebuilds."},{"lang":"es","value":"Un uso de directorio temporal no seguro en la funcionalidad frontend build de com.vaadin:flow-server versiones 2.0.9 hasta  2.5.2 (Vaadin versiones 14.0.3 hasta Vaadin 14.5.2), versiones 3.0 anteriores 6.0 (Vaadin versiones 15 anteriores a 19) y versiones 6.0 .0 hasta 6.0.5 (Vaadin versiones 19.0.0 hasta 19.0.4), permite a usuarios locales inyectar código malicioso en los recursos frontend durante la reconstrucción de la aplicación"}],"metrics":{"cvssMetricV31":[{"source":"security@vaadin.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N","baseScore":6.3,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.0,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security@vaadin.com","type":"Secondary","description":[{"lang":"en","value":"CWE-379"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.9","versionEndExcluding":"2.5.3","matchCriteriaId":"5BDE9ACA-7666-444D-8615-A164C0E0A8A4"},{"vulnerable":true,"criteria":"cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndIncluding":"5.0.0","matchCriteriaId":"2CA90E82-620F-46C0-AB1F-05804328BB54"},{"vulnerable":true,"criteria":"cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndIncluding":"6.0.6","matchCriteriaId":"B5DCFE72-3FCF-4ED7-A8B3-A0DBE48AE3A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.3","versionEndExcluding":"14.5.3","matchCriteriaId":"B77BD429-7BB9-454A-A2B2-71081416E416"},{"vulnerable":true,"criteria":"cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"19.0.5","matchCriteriaId":"5B1E8A6A-57AD-41FA-8768-9B60C356E78B"}]}]}],"references":[{"url":"https://github.com/vaadin/flow/pull/10640","source":"security@vaadin.com","tags":["Patch","Third Party Advisory"]},{"url":"https://vaadin.com/security/cve-2021-31411","source":"security@vaadin.com","tags":["Vendor Advisory"]},{"url":"https://github.com/vaadin/flow/pull/10640","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://vaadin.com/security/cve-2021-31411","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}