We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32951

io.jmix.rest:jmix-rest allows XSS in the /files Endpoint of the Generic REST API



Description

Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.

Reserved 2025-04-14 | Published 2025-04-22 | Updated 2025-05-27 | Assigner GitHub_M


MEDIUM: 6.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

>= 1.0.0, < 1.6.2
affected

>= 2.0.0, < 2.4.0
affected

References

github.com/...k/jmix/security/advisories/GHSA-x27v-f838-jh93

github.com/jmix-framework/jmix/issues/3804

github.com/jmix-framework/jmix/issues/3836

github.com/...ommit/6a66aa3adb967159a30d703e80403406f4c8f7a2

github.com/...ommit/c589ef4e2b25620770b8036f4ad05f1a6250cb6a

github.com/...ommit/cc97e6ff974b9e7af8160fab39cc5866169daa37

github.com/...ommit/f4e6fb05bd245cf36f3e9319aaa0fcd540d024aa

docs.jmix.io/jmix/files-vulnerabilities.html

docs.jmix.io/jmix/files-vulnerabilities.html

cve.org (CVE-2025-32951)

nvd.nist.gov (CVE-2025-32951)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32951

Support options

Helpdesk Chat, Email, Knowledgebase