{"id":"CVE-2020-35217","details":"Vert.x-Web framework v4.0 milestone 1-4 does not perform a correct CSRF verification. Instead of comparing the CSRF token in the request with the CSRF token in the cookie, it compares the CSRF token in the cookie against a CSRF token that is stored in the session. An attacker does not even need to provide a CSRF token in the request because the framework does not consider it. The cookies are automatically sent by the browser and the verification will always succeed, leading to a successful CSRF attack.","aliases":["GHSA-9q69-g5gc-9fgf"],"modified":"2026-02-13T08:41:37.225777Z","published":"2021-01-20T13:15:12.440Z","references":[{"type":"ADVISORY","url":"https://github.com/vert-x3/vertx-web/pull/1613"},{"type":"FIX","url":"https://github.com/vert-x3/vertx-web/pull/1613"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/vert-x3/vertx-web","events":[{"introduced":"0"},{"last_affected":"1d18809825e4280ab2e5302d6409783bea04f3b3"}]}],"versions":["3.0.0","3.0.0-milestone2","3.0.0-milestone3","3.0.0-milestone4","3.0.0-milestone5","3.0.0-milestone6","3.1.0","3.2.0","3.2.1","3.3.0","3.3.0.CR2","3.3.1","3.3.2","3.3.3","3.4.0","3.4.0.Beta1","3.4.1","3.4.2","3.5.0","3.5.0.Beta1","3.5.1","3.6.0","3.6.0.CR1","3.6.0.CR2","4.0.0-milestone1","4.0.0-milestone2","4.0.0-milestone4","4.0.0-milestone5","4.0.0.Beta1","4.0.0.Beta2","4.0.0.Beta3","4.0.0.CR1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-35217.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}