Vulnerability DatabaseGHSA-6hgr-2g6q-3rmc

GHSA-6hgr-2g6q-3rmc
Java vulnerability analysis and mitigation

Overview

Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) contains a vulnerability related to session invalidation during logout. The issue was discovered and disclosed in April 2021, affecting Vaadin Flow applications that use the Authentication module's logout() helper method in combination with Spring Security CSRF protection (Vaadin Security).

Technical details

The vulnerability stems from the Authentication.logout() helper using an incorrect HTTP method for logout operations. When Spring CSRF protection is enabled (which is the default in Spring Security), only HTTP POST requests are allowed for logout operations. However, the affected versions use HTTP GET requests, which fail to properly invalidate the session when CSRF protection is enabled. The vulnerability has been assigned a CVSS v3.1 base score of 6.3 (Moderate) with vector string CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N (GitHub Advisory).

Impact

When exploited, this vulnerability allows local attackers to continue accessing Fusion endpoints even after a user has attempted to log out. This creates a significant security risk as it fails to properly terminate user sessions, potentially exposing sensitive information and functionality to unauthorized access (Vaadin Security).

Mitigation and workarounds

The recommended mitigation is to upgrade to patched versions: Vaadin 19.0.4 or newer for Vaadin 19.x users. For Vaadin 18 users, which is no longer supported, upgrading to Vaadin 19.0.4 or a newer version is mandatory. The specific fix was implemented in com.vaadin:flow-client version 6.0.5. While it's possible to disable CSRF protection for logout, this approach is not recommended from a security standpoint (Vaadin Security).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26866HIGH8.8
  • JavaJava
  • org.apache.hugegraph:hg-pd-core
NoYesDec 12, 2025
CVE-2025-66474HIGH8.7
  • JavaJava
  • org.xwiki.rendering:xwiki-rendering-xml
NoYesDec 10, 2025
CVE-2025-66473HIGH8.7
  • JavaJava
  • org.xwiki.platform:xwiki-platform-rest-server
NoYesDec 10, 2025
CVE-2025-67505HIGH8.4
  • JavaJava
  • com.okta.sdk:okta-sdk-root
NoYesDec 10, 2025
CVE-2025-14518MEDIUM5.3
  • JavaJava
  • tech.powerjob:powerjob-common
NoNoDec 11, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management