CVE-2025-32952
Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the local file storage implementation does not restrict the size of uploaded files. An attacker could exploit this by uploading excessively large files, potentially causing the server to run out of space and return HTTP 500 error, resulting in a denial of service. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.
Vendor
Product
CWE
Yayın Tarihi
2025-04-22 18:16:00
Güncelleme
2025-12-31 15:55:53
Source Identifier
security-advisories@github.com
KEV Date Added
-
Kategoriler
Referanslar
https://docs.jmix.io/jmix/files-vulnerabilities.html
https://docs.jmix.io/jmix/files-vulnerabilities.html#disable-files-endpoint-in-jmix-application
https://github.com/jmix-framework/jmix/commit/6a66aa3adb967159a30d703e80403406f4c8f7a2
https://github.com/jmix-framework/jmix/commit/c589ef4e2b25620770b8036f4ad05f1a6250cb6a
https://github.com/jmix-framework/jmix/commit/cc97e6ff974b9e7af8160fab39cc5866169daa37
https://github.com/jmix-framework/jmix/commit/f4e6fb05bd245cf36f3e9319aaa0fcd540d024aa
https://github.com/jmix-framework/jmix/issues/3804
https://github.com/jmix-framework/jmix/issues/3836
https://github.com/jmix-framework/jmix/security/advisories/GHSA-f3gv-cwwh-758m