CVE-2025-32951

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-32951
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-32951.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-32951
Aliases
Published
2025-04-22T18:15:59Z
Modified
2025-05-28T03:54:13.511884Z
Summary
[none]
Details

Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.

References

Affected packages

Git / github.com/jmix-framework/jmix

Affected ranges

Type
GIT
Repo
https://github.com/jmix-framework/jmix
Events

Affected versions

v1.*

v1.2.0-RC1
v1.6.0
v1.6.0-RC1
v1.6.1

v2.*

v2.4.0-RC1