CVE-2025-32952
6.5
MediumCVE-2025-32952
•
security-advisories@github.com
•
Awaiting Analysis
Description
Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the local file storage implementation does not restrict the size of uploaded files. An attacker could exploit this by uploading excessively large files, potentially causing the server to run out of space and return HTTP 500 error, resulting in a denial of service. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.
Exploits
No known exploits found for this CVE.
Search Exploit-DBReferences
security-advisories@github.com
https://docs.jmix.io/jmix/files-vulnerabilities.htmlsecurity-advisories@github.com
https://docs.jmix.io/jmix/files-vulnerabilities.html#disable-files-endpoint-in-jmix-applicationsecurity-advisories@github.com
https://github.com/jmix-framework/jmix/security/advisories/GHSA-f3gv-cwwh-758m