CVE-2025-32952

medium

Description

Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the local file storage implementation does not restrict the size of uploaded files. An attacker could exploit this by uploading excessively large files, potentially causing the server to run out of space and return HTTP 500 error, resulting in a denial of service. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.

References

https://github.com/jmix-framework/jmix/security/advisories/GHSA-f3gv-cwwh-758m

https://docs.jmix.io/jmix/files-vulnerabilities.html#disable-files-endpoint-in-jmix-application

https://docs.jmix.io/jmix/files-vulnerabilities.html

Details

Source: Mitre, NVD

Published: 2025-04-22

Updated: 2025-04-23

Risk Information

CVSS v2

Base Score: 6.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C

Severity: Medium

CVSS v3

Base Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Severity: Medium