CVE-2019-25027
Java vulnerability analysis and mitigation

Overview

Missing output sanitization in default RouteNotFoundError view in com.vaadin:flow-server versions 1.0.0 through 1.0.10 (Vaadin 10.0.0 through 10.0.13), and 1.1.0 through 1.4.2 (Vaadin 11.0.0 through 13.0.5) allows attacker to execute malicious JavaScript via crafted URL. The vulnerability was disclosed on May 27, 2019, and has been assigned a CVSS v3.1 base score of 6.1 (Medium severity) (Vaadin Security).

Technical details

The vulnerability is classified as a Reflected Cross-Site Scripting (XSS) issue due to improper neutralization of script in an error message web page (CWE-81). The default RouteNotFoundError view could be exploited to execute unwanted JavaScript in a user's browser when the user opens a specially crafted URL, due to the lack of proper output sanitization (Vaadin Security).

Impact

When successfully exploited, this vulnerability allows attackers to execute malicious JavaScript code in the context of the user's browser session. The CVSS metrics indicate low impact on both confidentiality and integrity, with no impact on availability. The attack requires user interaction and can affect resources beyond the security scope of the affected component (Vaadin Security).

Mitigation and workarounds

Users of affected versions should upgrade to fixed versions: Vaadin 10.0.0-10.0.13 users should upgrade to 10.0.14 or newer, Vaadin 13.0.0-13.0.5 users should upgrade to 13.0.6 or newer. For the affected flow-server component, version 1.0.0-1.0.10 should be upgraded to ≥1.0.11, and version 1.4.0-1.4.2 should be upgraded to ≥1.4.3. Vaadin versions 11-12 are no longer supported and users should upgrade to version 13.0.6 or newer (Vaadin Security).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55749HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-tool-jetty-resources
NoYesDec 01, 2025
CVE-2025-13806MEDIUM6.9
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-13805MEDIUM6.3
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-13804MEDIUM5.3
  • JavaJava
  • org.nutz:nutzboot-parent
NoNoDec 01, 2025
CVE-2025-66372LOW2.8
  • JavaJava
  • org.mustangproject:library
NoYesNov 28, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management