CVE-2025-32952

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-32952
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-32952.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-32952
Aliases
Published
2025-04-22T18:16:00Z
Modified
2025-05-28T03:13:02.796253Z
Summary
[none]
Details

Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the local file storage implementation does not restrict the size of uploaded files. An attacker could exploit this by uploading excessively large files, potentially causing the server to run out of space and return HTTP 500 error, resulting in a denial of service. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.

References

Affected packages

Git / github.com/jmix-framework/jmix

Affected ranges

Type
GIT
Repo
https://github.com/jmix-framework/jmix
Events

Affected versions

v1.*

v1.2.0-RC1
v1.6.0
v1.6.0-RC1
v1.6.1

v2.*

v2.4.0-RC1