CVE-2025-32952

Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the local file storage implementation does not restrict the size of uploaded files. An attacker could exploit this by uploading excessively large files, potentially causing the server to run out of space and return HTTP 500 error, resulting in a denial of service. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:haulmont:cuba_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:haulmont:cuba_rest_api:*:*:*:*:*:*:*:*
cpe:2.3:a:haulmont:jmix_framework:*:*:*:*:*:*:*:*
cpe:2.3:a:haulmont:jmix_framework:*:*:*:*:*:*:*:*
cpe:2.3:a:haulmont:jpa_web_api:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-04-22 18:16

Updated : 2025-12-31 15:55


NVD link : CVE-2025-32952

Mitre link : CVE-2025-32952

CVE.ORG link : CVE-2025-32952


JSON object : View

Products Affected

haulmont

  • cuba_rest_api
  • jpa_web_api
  • jmix_framework
  • cuba_platform
CWE
CWE-770

Allocation of Resources Without Limits or Throttling