{"vulnerability": "CVE-2025-32952", "sightings": [{"uuid": "88f295ce-befd-4ab9-9860-11c7740a1735", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32952", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13459", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-32952\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)\n\ud83d\udd39 Description: Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the local file storage implementation does not restrict the size of uploaded files. An attacker could exploit this by uploading excessively large files, potentially causing the server to run out of space and return HTTP 500 error, resulting in a denial of service. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.\n\ud83d\udccf Published: 2025-04-22T17:32:11.966Z\n\ud83d\udccf Modified: 2025-04-25T16:03:04.176Z\n\ud83d\udd17 References:\n1. https://github.com/jmix-framework/jmix/security/advisories/GHSA-f3gv-cwwh-758m\n2. https://docs.jmix.io/jmix/files-vulnerabilities.html\n3. https://docs.jmix.io/jmix/files-vulnerabilities.html#disable-files-endpoint-in-jmix-application", "creation_timestamp": "2025-04-25T16:07:18.000000Z"}, {"uuid": "cfce44e5-a111-4551-910d-410671dce12c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-32952", "type": "seen", "source": "https://t.me/cvedetector/23552", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-32952 - Jmix File Size Limitation Dos\", \n  \"Content\": \"CVE ID : CVE-2025-32952 \nPublished : April 22, 2025, 6:16 p.m. | 1\u00a0hour, 47\u00a0minutes ago \nDescription : Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the local file storage implementation does not restrict the size of uploaded files. An attacker could exploit this by uploading excessively large files, potentially causing the server to run out of space and return HTTP 500 error, resulting in a denial of service. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-22T22:35:31.000000Z"}]}