CVE-2026-2742 PUBLISHED

Unauthorized session creation via reserved framework path access

Assigner: Vaadin
Reserved: 19.02.2026 Published: 10.03.2026 Updated: 10.03.2026

An authentication bypass vulnerability exists in Vaadin 14.0.0 through 14.14.0, 23.0.0 through 23.6.6, 24.0.0 through 24.9.7 and 25.0.0 through 25.0.1, applications using Spring Security due to inconsistent path pattern matching of reserved framework paths.

Accessing the /VAADIN endpoint without a trailing slash bypasses security filters, and allowing unauthenticated users to trigger framework initialization and create sessions without proper authorization.

Users of affected versions using Spring Security should upgrade as follows: 14.0.0-14.14.0 upgrade to 14.14.1, 23.0.0-23.6.6 to 23.6.7, 24.0.0 - 24.9.7 to 24.9.8, and 25.0.0-25.0.1 upgrade to 25.0.2 or newer.

Please note that Vaadin versions 10-13 and 15-22 are no longer supported and you should update either to the latest 14, 23, 24, 25 version.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/S:N/AU:Y/R:A/V:D/RE:L/U:Amber
CVSS Score: 5.3

Product Status

Vendor vaadin
Product vaadin
Versions Default: unaffected
  • affected from 14.0.0 to 14.14.0 (incl.)
  • affected from 23.0.0 to 23.6.6 (incl.)
  • affected from 24.0.0 to 24.9.7 (incl.)
  • affected from 25.0.0 to 25.0.1 (incl.)
Vendor vaadin
Product flow
Versions Default: unaffected
  • affected from 14.0.0 to 14.14.0 (incl.)
  • affected from 23.0.0 to 23.6.6 (incl.)
  • affected from 24.0.0 to 24.9.7 (incl.)
  • affected from 25.0.0 to 25.0.1 (incl.)

Solutions

Users of affected versions should apply the following mitigation or upgrade.

References

Problem Types

  • CWE-284 Improper Access Control CWE

Impacts

  • CAPEC-554 Functionality Bypass