Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.

Project Subscriptions

Vendors Products
Haulmont Subscribe
Cuba Platform Subscribe
Cuba Rest Api Subscribe
Jmix Framework Subscribe
Jpa Web Api Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2025-12225 Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.
Github GHSA Github GHSA GHSA-x27v-f838-jh93 io.jmix.rest:jmix-rest allows XSS in the /files Endpoint of the Generic REST API
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 31 Dec 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Haulmont
Haulmont cuba Platform
Haulmont cuba Rest Api
Haulmont jmix Framework
Haulmont jpa Web Api
CPEs cpe:2.3:a:haulmont:cuba_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:haulmont:cuba_rest_api:*:*:*:*:*:*:*:*
cpe:2.3:a:haulmont:jmix_framework:*:*:*:*:*:*:*:*
cpe:2.3:a:haulmont:jpa_web_api:*:*:*:*:*:*:*:*
Vendors & Products Haulmont
Haulmont cuba Platform
Haulmont cuba Rest Api
Haulmont jmix Framework
Haulmont jpa Web Api

Tue, 27 May 2025 17:30:00 +0000


Fri, 25 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 22 Apr 2025 17:45:00 +0000

Type Values Removed Values Added
Description Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.
Title io.jmix.rest:jmix-rest allows XSS in the /files Endpoint of the Generic REST API
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-05-27T17:18:23.124Z

Reserved: 2025-04-14T21:47:11.450Z

Link: CVE-2025-32951

cve-icon Vulnrichment

Updated: 2025-04-24T19:56:31.558Z

cve-icon NVD

Status : Analyzed

Published: 2025-04-22T18:15:59.940

Modified: 2025-12-31T15:57:34.573

Link: CVE-2025-32951

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses