Vulnerability DatabaseGHSA-crh4-294p-vcfq

GHSA-crh4-294p-vcfq
Java vulnerability analysis and mitigation

Overview

A Regular expression Denial of Service (ReDoS) vulnerability was discovered in the EmailField component of Vaadin's flow-components. The vulnerability affects com.vaadin:vaadin-text-field-flow versions 2.0.4 through 2.3.2 (Vaadin 14.0.6 through 14.4.3), and 3.0.0 through 4.0.2 (Vaadin 15.0.0 through 17.0.10). The vulnerability was published on April 16, 2021, and is tracked as CVE-2021-31405 with a high severity CVSS score of 7.5 (GitHub Advisory, Vaadin Security).

Technical details

The vulnerability stems from an unsafe validation RegEx in the EmailField component that is susceptible to exponential backtracking. The issue is classified as CWE-400: Uncontrolled Resource Consumption. The vulnerability has a CVSS v3.1 base score of 7.5 with the following metrics: Attack Vector: Network, Attack Complexity: Low, Privileges Required: None, User Interaction: None, Scope: Unchanged, Confidentiality: None, Integrity: None, and Availability: High (Vaadin Security).

Impact

When exploited, this vulnerability can lead to uncontrolled resource consumption and denial of service. The UI thread of the server can spend an indefinite amount of time matching malicious email addresses to the validation pattern. Repeated attacks can cause thread pool or resource exhaustion, making the application unresponsive for normal users (Vaadin Security).

Mitigation and workarounds

Users of affected versions should upgrade to patched versions: Vaadin 14.0.6 - 14.4.3 should upgrade to 14.4.4 or newer, Vaadin 17.0.0 - 17.0.10 should upgrade to 17.0.11 or newer. Users of Vaadin 15-16 should upgrade to version 17.0.11 or newer as these versions are no longer supported. The fixed versions for the affected packages are com.vaadin:vaadin-text-field-flow 2.3.3 and 4.0.3 (Vaadin Security).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26866HIGH8.8
  • JavaJava
  • org.apache.hugegraph:hg-pd-core
NoYesDec 12, 2025
CVE-2025-54981HIGH7.5
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025
CVE-2025-67721MEDIUM6.3
  • JavaJava
  • trino
NoYesDec 12, 2025
CVE-2025-53960MEDIUM5.9
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025
CVE-2025-54947MEDIUM5.3
  • JavaJava
  • org.apache.streampark:streampark
NoYesDec 12, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management