{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-9467","assignerOrgId":"9e0f3122-90e9-42d5-93de-8c6b98deef7e","state":"PUBLISHED","assignerShortName":"Vaadin","dateReserved":"2025-08-25T14:57:19.966Z","datePublished":"2025-09-04T06:15:47.336Z","dateUpdated":"2025-09-04T13:41:24.243Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://repo.maven.apache.org/maven2","defaultStatus":"unaffected","packageName":"com.vaadin:vaadin","product":"vaadin","repo":"https://github.com/vaadin/platform","vendor":"vaadin","versions":[{"lessThanOrEqual":"14.13.0","status":"affected","version":"14.0.0","versionType":"maven"},{"lessThanOrEqual":"23.6.1","status":"affected","version":"23.0.0","versionType":"maven"},{"lessThanOrEqual":"24.7.6","status":"affected","version":"24.0.0","versionType":"maven"}]},{"collectionURL":"https://repo.maven.apache.org/maven2","defaultStatus":"unaffected","packageName":"com.vaadin:vaadin-server","product":"framework","repo":"https://github.com/vaadin/framework","vendor":"vaadin","versions":[{"lessThanOrEqual":"7.7.47","status":"affected","version":"7.0.0","versionType":"maven"},{"lessThanOrEqual":"8.28.1","status":"affected","version":"8.0.0","versionType":"maven"}]},{"collectionURL":"https://repo.maven.apache.org/maven2","defaultStatus":"unaffected","packageName":"com.vaadin:vaadin-upload-flow","product":"vaadin-upload-flow","repo":"https://github.com/vaadin/flow-components","vendor":"vaadin","versions":[{"lessThanOrEqual":"14.13.0","status":"affected","version":"14.0.0","versionType":"maven"},{"lessThanOrEqual":"23.6.1","status":"affected","version":"23.0.0","versionType":"maven"},{"lessThanOrEqual":"24.7.6","status":"affected","version":"24.0.0","versionType":"maven"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgba(232, 232, 232, 0.04);\">When the Vaadin Upload's start listener is used to validate metadata about an incoming upload, it is possible to bypass the upload validation. <br><br><br>Users of affected versions should apply the following mitigation or upgrade. Releases that have fixed this issue include:<br><br>Product version<br>Vaadin 7.0.0 - 7.7.47<br>Vaadin 8.0.0 - 8.28.1<br>Vaadin 14.0.0 - 14.13.0<br>Vaadin 23.0.0 - 23.6.1<br>Vaadin 24.0.0 - 24.7.6<br><br>Mitigation<br>Upgrade to 7.7.48<br>Upgrade to 8.28.2<br>Upgrade to 14.13.1<br>Upgrade to 23.6.2<br>Upgrade to 24.7.7 or newer<br><br>Please note that Vaadin versions 10-13 and 15-22 are no longer supported and you should update either to the latest 14, 23, 24 version.<br><br>Artifacts&nbsp; &nbsp; &nbsp;<table><tbody><tr><td>Maven coordinates</td><td>Vulnerable versions</td><td>Fixed version</td></tr><tr><td>com.vaadin:vaadin-server<br></td><td>7.0.0 - 7.7.47<br></td><td>≥7.7.48<br></td></tr><tr><td>com.vaadin:vaadin-server<br></td><td>8.0.0 - 8.28.1<br></td><td>≥8.28.2<br></td></tr><tr><td>com.vaadin:vaadin<br></td><td>14.0.0 - 14.13.0<br></td><td>≥14.13.1<br></td></tr><tr><td>com.vaadin:vaadin</td><td>23.0.0 - 23.6.1<br></td><td>≥23.6.2<br></td></tr><tr><td>com.vaadin:vaadin</td><td>24.0.0 - 24.7.6<br></td><td>≥24.7.7</td></tr><tr><td>com.vaadin:vaadin-upload-flow<br></td><td>2.0.0 - 14.13.0<br></td><td>≥14.13.1<br></td></tr><tr><td>com.vaadin:vaadin-upload-flow<br></td><td>23.0.0 - 23.6.1<br></td><td>≥23.6.2<br></td></tr><tr><td>com.vaadin:vaadin-upload-flow<br></td><td>24.0.0 - 24.7.6<br></td><td>≥24.7.7<br></td></tr></tbody></table><br></span><p><br></p>"}],"value":"When the Vaadin Upload's start listener is used to validate metadata about an incoming upload, it is possible to bypass the upload validation. \n\n\nUsers of affected versions should apply the following mitigation or upgrade. Releases that have fixed this issue include:\n\nProduct version\nVaadin 7.0.0 - 7.7.47\nVaadin 8.0.0 - 8.28.1\nVaadin 14.0.0 - 14.13.0\nVaadin 23.0.0 - 23.6.1\nVaadin 24.0.0 - 24.7.6\n\nMitigation\nUpgrade to 7.7.48\nUpgrade to 8.28.2\nUpgrade to 14.13.1\nUpgrade to 23.6.2\nUpgrade to 24.7.7 or newer\n\nPlease note that Vaadin versions 10-13 and 15-22 are no longer supported and you should update either to the latest 14, 23, 24 version.\n\nArtifacts     Maven coordinatesVulnerable versionsFixed versioncom.vaadin:vaadin-server\n7.0.0 - 7.7.47\n≥7.7.48\ncom.vaadin:vaadin-server\n8.0.0 - 8.28.1\n≥8.28.2\ncom.vaadin:vaadin\n14.0.0 - 14.13.0\n≥14.13.1\ncom.vaadin:vaadin23.0.0 - 23.6.1\n≥23.6.2\ncom.vaadin:vaadin24.0.0 - 24.7.6\n≥24.7.7com.vaadin:vaadin-upload-flow\n2.0.0 - 14.13.0\n≥14.13.1\ncom.vaadin:vaadin-upload-flow\n23.0.0 - 23.6.1\n≥23.6.2\ncom.vaadin:vaadin-upload-flow\n24.0.0 - 24.7.6\n≥24.7.7"}],"impacts":[{"capecId":"CAPEC-554","descriptions":[{"lang":"en","value":"CAPEC-554 Functionality Bypass"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NO","Recovery":"USER","Safety":"NEGLIGIBLE","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":5.3,"baseSeverity":"MEDIUM","privilegesRequired":"LOW","providerUrgency":"GREEN","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"DIFFUSE","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:D/RE:L/U:Green","version":"4.0","vulnAvailabilityImpact":"LOW","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"LOW"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"9e0f3122-90e9-42d5-93de-8c6b98deef7e","shortName":"Vaadin","dateUpdated":"2025-09-04T11:58:03.368Z"},"references":[{"url":"https://vaadin.com/security/cve-2025-9467"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<b><span style=\"background-color: transparent;\">Users of affected versions should apply the following mitigation or upgrade.</span></b><br>"}],"value":"Users of affected versions should apply the following mitigation or upgrade."}],"source":{"discovery":"UNKNOWN"},"title":"Possibility to bypass file upload validation on the server-side","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<b><span style=\"background-color: transparent;\">This issue can also be worked around without updating the version by validating the upload metadata again in the Upload's finished listener.</span></b><br>"}],"value":"This issue can also be worked around without updating the version by validating the upload metadata again in the Upload's finished listener."}],"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-09-04T13:28:46.739599Z","id":"CVE-2025-9467","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-09-04T13:41:24.243Z"}}]}}