{"uuid": "8ffa92c5-367b-4585-bb73-5a881cbd9667", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32951", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13460", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32951\n\ud83d\udd25 CVSS Score: 6.4 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N)\n\ud83d\udd39 Description: Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.\n\ud83d\udccf Published: 2025-04-22T17:32:23.401Z\n\ud83d\udccf Modified: 2025-04-25T16:02:55.977Z\n\ud83d\udd17 References:\n1. https://github.com/jmix-framework/jmix/security/advisories/GHSA-x27v-f838-jh93\n2. https://docs.jmix.io/jmix/files-vulnerabilities.html\n3. https://docs.jmix.io/jmix/files-vulnerabilities.html#disable-files-endpoint-in-jmix-application", "creation_timestamp": "2025-04-25T16:07:19.000000Z"}