{"api_version":"1","generated_at":"2026-05-13T00:06:32+00:00","cve":"CVE-2021-31408","urls":{"html":"https://cve.report/CVE-2021-31408","api":"https://cve.report/api/cve/CVE-2021-31408.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-31408","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-31408"},"summary":{"title":"CVE-2021-31408","description":"Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.","state":"PUBLIC","assigner":"security@vaadin.com","published_at":"2021-04-23 17:15:00","updated_at":"2021-05-04 16:19:00"},"problem_types":["CWE-613"],"metrics":[],"references":[{"url":"https://github.com/vaadin/flow/pull/10577","name":"https://github.com/vaadin/flow/pull/10577","refsource":"MISC","tags":[],"title":"fix: store spring csrf to bootstrap page by haijian-vaadin · Pull Request #10577 · vaadin/flow · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://vaadin.com/security/cve-2021-31408","name":"https://vaadin.com/security/cve-2021-31408","refsource":"MISC","tags":[],"title":"CVE-2021-31408: Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-31408","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-31408","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"31408","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vaadin","cpe5":"flow","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"31408","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vaadin","cpe5":"vaadin","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2021","cve_id":"31408","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"vaadin","cpe5":"vaadin","cpe6":"18.0.0","cpe7":"-","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2021-31408","qid":"982687","title":"Java (maven) Security Update for com.vaadin:vaadin-bom (GHSA-mr8h-j9cv-4m8h)"}]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","generator":{"engine":"Vulnogram 0.0.9"},"CVE_data_meta":{"ID":"CVE-2021-31408","ASSIGNER":"security@vaadin.com","DATE_PUBLIC":"2021-04-20T08:17:00.000Z","TITLE":"Server session is not invalidated when logout() helper method of Authentication module is used in Vaadin 18-19","AKA":"","STATE":"PUBLIC"},"source":{"defect":[],"advisory":"","discovery":"INTERNAL"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Vaadin","product":{"product_data":[{"product_name":"Vaadin","version":{"version_data":[{"version_name":"","version_affected":">=","version_value":"18.0.0","platform":""},{"version_name":"","version_affected":"<","version_value":"19.0.0","platform":""},{"version_name":"","version_affected":">=","version_value":"19.0.0","platform":""},{"version_name":"","version_affected":"<=","version_value":"19.0.3","platform":""}]}},{"product_name":"flow-client","version":{"version_data":[{"version_name":"","version_affected":">=","version_value":"5.0.0","platform":""},{"version_name":"","version_affected":"<","version_value":"6.0.0","platform":""},{"version_name":"","version_affected":">=","version_value":"6.0.0","platform":""},{"version_name":"","version_affected":"<=","version_value":"6.0.4","platform":""}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-613 Insufficient Session Expiration"}]}]},"description":{"description_data":[{"lang":"eng","value":"Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out."}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://vaadin.com/security/cve-2021-31408","name":"https://vaadin.com/security/cve-2021-31408"},{"refsource":"MISC","url":"https://github.com/vaadin/flow/pull/10577","name":"https://github.com/vaadin/flow/pull/10577"}]},"configuration":[],"impact":{"cvss":{"version":"3.1","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N","baseScore":6.3,"baseSeverity":"MEDIUM"}},"exploit":[],"work_around":[],"solution":[],"credit":[]},"nvd":{"publishedDate":"2021-04-23 17:15:00","lastModifiedDate":"2021-05-04 16:19:00","problem_types":["CWE-613"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.1,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.2},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:P/A:N","accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":3.3},"severity":"LOW","exploitabilityScore":3.4,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"6.0.0","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vaadin:flow:*:*:*:*:*:*:*:*","versionStartIncluding":"6.0.0","versionEndExcluding":"6.0.5","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*","versionStartIncluding":"19.0.0","versionEndExcluding":"19.0.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:vaadin:vaadin:18.0.0:-:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"31408","Ordinal":"206695","Title":"CVE-2021-31408","CVE":"CVE-2021-31408","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"31408","Ordinal":"1","NoteData":"Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after the user attempted to log out.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"31408","Ordinal":"2","NoteData":"2021-04-23","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"31408","Ordinal":"3","NoteData":"2021-04-23","Type":"Other","Title":"Modified"}]}}}