CVE-2025-32951

Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:haulmont:cuba_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:haulmont:cuba_rest_api:*:*:*:*:*:*:*:*
cpe:2.3:a:haulmont:jmix_framework:*:*:*:*:*:*:*:*
cpe:2.3:a:haulmont:jmix_framework:*:*:*:*:*:*:*:*
cpe:2.3:a:haulmont:jpa_web_api:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-04-22 18:15

Updated : 2025-12-31 15:57


NVD link : CVE-2025-32951

Mitre link : CVE-2025-32951

CVE.ORG link : CVE-2025-32951


JSON object : View

Products Affected

haulmont

  • cuba_rest_api
  • jpa_web_api
  • jmix_framework
  • cuba_platform
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')