Description

Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the local file storage implementation does not restrict the size of uploaded files. An attacker could exploit this by uploading excessively large files, potentially causing the server to run out of space and return HTTP 500 error, resulting in a denial of service. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.

INFO

Published Date :

2025-04-22T17:32:11.966Z

Last Modified :

2025-05-27T17:00:25.356Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-32952 vulnerability.

Vendors Products
Haulmont
  • Cuba Platform
  • Cuba Rest Api
  • Jmix Framework
  • Jpa Web Api

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact