{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T05:27:20.667","vulnerabilities":[{"cve":{"id":"CVE-2025-32952","sourceIdentifier":"security-advisories@github.com","published":"2025-04-22T18:16:00.097","lastModified":"2025-12-31T15:55:53.993","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the local file storage implementation does not restrict the size of uploaded files. An attacker could exploit this by uploading excessively large files, potentially causing the server to run out of space and return HTTP 500 error, resulting in a denial of service. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website."},{"lang":"es","value":"Jmix es un conjunto de librerías y herramientas para acelerar el desarrollo de aplicaciones centradas en datos en Spring Boot. En las versiones 1.0.0 a 1.6.1 y 2.0.0 a 2.3.4, la implementación del almacenamiento local de archivos no restringe el tamaño de los archivos subidos. Un atacante podría aprovechar esta situación subiendo archivos excesivamente grandes, lo que podría provocar que el servidor se quede sin espacio y devuelva un error HTTP 500, lo que resulta en una denegación de servicio. Este problema se ha corregido en las versiones 1.6.2 y 2.4.0. Se ofrece un workaround en el sitio web de documentación de Jmix."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-770"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:haulmont:cuba_platform:*:*:*:*:*:*:*:*","versionStartIncluding":"6.2.0","versionEndExcluding":"7.2.23","matchCriteriaId":"4144D951-290E-4CDD-88B0-F4052FD28B7F"},{"vulnerable":true,"criteria":"cpe:2.3:a:haulmont:cuba_rest_api:*:*:*:*:*:*:*:*","versionStartIncluding":"7.1.1","versionEndExcluding":"7.2.7","matchCriteriaId":"9943C493-5789-4D32-A280-7BA564818C8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:haulmont:jmix_framework:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.6.2","matchCriteriaId":"A877F67E-4952-4984-8F29-A5DFD0E3090A"},{"vulnerable":true,"criteria":"cpe:2.3:a:haulmont:jmix_framework:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.4.0","matchCriteriaId":"266AE114-6141-48C3-BCBC-33C47FBE0B89"},{"vulnerable":true,"criteria":"cpe:2.3:a:haulmont:jpa_web_api:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.1.1","matchCriteriaId":"FCA5975A-4E12-4D55-A93B-486BC1D9F219"}]}]}],"references":[{"url":"https://docs.jmix.io/jmix/files-vulnerabilities.html","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://docs.jmix.io/jmix/files-vulnerabilities.html#disable-files-endpoint-in-jmix-application","source":"security-advisories@github.com","tags":["Vendor Advisory"]},{"url":"https://github.com/jmix-framework/jmix/commit/6a66aa3adb967159a30d703e80403406f4c8f7a2","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/jmix-framework/jmix/commit/c589ef4e2b25620770b8036f4ad05f1a6250cb6a","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/jmix-framework/jmix/commit/cc97e6ff974b9e7af8160fab39cc5866169daa37","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/jmix-framework/jmix/commit/f4e6fb05bd245cf36f3e9319aaa0fcd540d024aa","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/jmix-framework/jmix/issues/3804","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/jmix-framework/jmix/issues/3836","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/jmix-framework/jmix/security/advisories/GHSA-f3gv-cwwh-758m","source":"security-advisories@github.com","tags":["Patch","Vendor Advisory"]}]}}]}