Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-12225 | Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website. |
Github GHSA |
GHSA-x27v-f838-jh93 | io.jmix.rest:jmix-rest allows XSS in the /files Endpoint of the Generic REST API |
Wed, 31 Dec 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Haulmont
Haulmont cuba Platform Haulmont cuba Rest Api Haulmont jmix Framework Haulmont jpa Web Api |
|
| CPEs | cpe:2.3:a:haulmont:cuba_platform:*:*:*:*:*:*:*:* cpe:2.3:a:haulmont:cuba_rest_api:*:*:*:*:*:*:*:* cpe:2.3:a:haulmont:jmix_framework:*:*:*:*:*:*:*:* cpe:2.3:a:haulmont:jpa_web_api:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Haulmont
Haulmont cuba Platform Haulmont cuba Rest Api Haulmont jmix Framework Haulmont jpa Web Api |
Tue, 27 May 2025 17:30:00 +0000
Fri, 25 Apr 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 22 Apr 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website. | |
| Title | io.jmix.rest:jmix-rest allows XSS in the /files Endpoint of the Generic REST API | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-05-27T17:18:23.124Z
Reserved: 2025-04-14T21:47:11.450Z
Link: CVE-2025-32951
Updated: 2025-04-24T19:56:31.558Z
Status : Analyzed
Published: 2025-04-22T18:15:59.940
Modified: 2025-12-31T15:57:34.573
Link: CVE-2025-32951
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA