CVE-2018-25007
Java vulnerability analysis and mitigation

Overview

CVE-2018-25007 is a security vulnerability affecting com.vaadin:flow-server versions 1.0.0 through 1.0.5 (Vaadin 10.0.0 through 10.0.7, and 11.0.0 through 11.0.2). The vulnerability was discovered and disclosed in 2018, with the CVE being assigned on April 13, 2021. The issue stems from a missing check in the UIDL request handler that allows attackers to update element property values through crafted synchronization messages (Vaadin Security).

Technical details

The vulnerability is classified with a CVSS v3.1 base score of 2.6 (Low severity) with the following vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N. The issue is categorized as CWE-754: Improper Check for Unusual or Exceptional Conditions. The technical issue allows server-side element property values to be updated from the client in unexpected situations through fake synchronization messages. The server-side value was only updated in cases where the client filter was not set, while read-only and disabled element property updates remained blocked (Vaadin Security).

Impact

The vulnerability's impact is primarily focused on situations where template models contain beans in a list, allowing properties of the beans to be updated when not intended. The impact is limited as read-only and disabled element property updates were not affected by this issue. The vulnerability could affect logic that reads element property values and expects those to be immutable from the client side (Vaadin Security).

Mitigation and workarounds

Users of affected versions are advised to upgrade to fixed versions. For Vaadin 10.0.0 - 10.0.7, users should upgrade to version 10.0.8 or newer. For Vaadin 11.0.0 - 11.0.2, users should upgrade to version 11.0.3 or newer. The flow-server component should be updated to version 1.0.6 or higher (Vaadin Security).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-66516CRITICAL10
  • JavaJava
  • org.apache.tika:tika-parser-pdf-module
NoYesDec 04, 2025
CVE-2025-66566HIGH8.2
  • JavaJava
  • at.yawk.lz4:lz4-java
NoYesDec 05, 2025
CVE-2025-66623HIGH7.4
  • JavaJava
  • io.strimzi:strimzi
NoYesDec 05, 2025
GHSA-93fv-4pm9-xp28MEDIUM6.9
  • JavaJava
  • net.dv8tion:jda
NoYesDec 09, 2025
CVE-2025-11222MEDIUM6.1
  • JavaJava
  • com.linecorp.centraldogma:centraldogma-server-auth-shiro
NoYesDec 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management