Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. com.vaadin/vaadin-spreadsheet-flow
  4. ›
  5. CVE-2025-15022

CVE-2025-15022: Vaadin vulnerable to Cross-site Scripting

January 5, 2026

Action captions in Vaadin accept HTML by default but were not sanitized, potentially allowing Cross-site Scripting (XSS) if caption content is derived from user input.

In Vaadin Framework 7 and 8, the Action class is a general-purpose class that may be used by multiple components. The fixed versions sanitize captions by default and provide an API to explicitly enable HTML content mode for backwards compatibility.

In Vaadin 23 and newer, the Action class is only used by the Spreadsheet component. The fixed versions sanitize HTML using Jsoup with a relaxed safelist.

Vaadin 14 is not affected as Spreadsheet component was not supported.

Users of affected versions should apply the following mitigation or upgrade. Releases that have fixed this issue include:

Product version Vaadin 7.0.0 - 7.7.49 Vaadin 8.0.0 - 8.29.1 Vaadin 23.1.0 - 23.6.5 Vaadin 24.0.0 - 24.8.13 Vaadin 24.9.0 - 24.9.6

Mitigation Upgrade to 7.7.50 Upgrade to 8.30.0 Upgrade to 23.6.6 Upgrade to 24.8.14 or 24.9.7 Upgrade to 25.0.0 or newer

Artifacts     Maven coordinatesVulnerable versionsFixed versioncom.vaadin:vaadin-server 7.0.0 - 7.7.49 ≥7.7.50 com.vaadin:vaadin-server 8.0.0 - 8.29.1 ≥8.30.0 com.vaadin:vaadin 23.1.0 - 23.6.5 ≥23.6.6 com.vaadin:vaadin24.0.0 - 24.8.13 ≥24.8.14 com.vaadin:vaadin24.9.0 - 24.9.6 ≥24.9.7 com.vaadin:vaadin-spreadsheet-flow 23.1.0 - 23.6.5 ≥23.6.6 com.vaadin:vaadin-spreadsheet-flow 24.0.0 - 24.8.13 ≥24.8.14 com.vaadin:vaadin-spreadsheet-flow 24.9.0 - 24.9.6 ≥24.9.7

References

  • github.com/advisories/GHSA-7wwv-79xw-rvvg
  • github.com/vaadin/flow-components
  • github.com/vaadin/flow-components/commit/71046aa3dd08be0907bd03140c33131b94f6e99c
  • github.com/vaadin/flow-components/pull/8285
  • nvd.nist.gov/vuln/detail/CVE-2025-15022
  • vaadin.com/security/cve-2025-15022

Code Behaviors & Features

Detect and mitigate CVE-2025-15022 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 23.1.0 before 23.6.6, all versions starting from 24.0.0 before 24.8.14, all versions starting from 24.9.0 before 24.9.7

Fixed versions

  • 23.6.6
  • 24.8.14
  • 24.9.7

Solution

Upgrade to versions 23.6.6, 24.8.14, 24.9.7 or above.

Impact 4.6 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

maven/com.vaadin/vaadin-spreadsheet-flow/CVE-2025-15022.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 04 Feb 2026 00:36:56 +0000.