CVE-2025-32952: CWE-770: Allocation of Resources Without Limits or Throttling in jmix-framework jmix
Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the local file storage implementation does not restrict the size of uploaded files. An attacker could exploit this by uploading excessively large files, potentially causing the server to run out of space and return HTTP 500 error, resulting in a denial of service. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.
AI Analysis
Technical Summary
CVE-2025-32952 is a medium severity vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the jmix-framework, a set of libraries and tools designed to accelerate Spring Boot data-centric application development. The vulnerability exists in the local file storage implementation of jmix versions 1.0.0 through 1.6.1 and 2.0.0 through 2.3.4. Specifically, the system does not impose any restrictions on the size of files uploaded by users. An attacker can exploit this by uploading excessively large files, which can exhaust the server's disk space. This resource exhaustion leads to server instability, causing HTTP 500 internal server errors and resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires network access and low privileges (PR:L), with no user interaction needed, making it relatively easy to exploit remotely. The issue has been addressed in versions 1.6.2 and 2.4.0 of jmix, and a workaround is documented on the official Jmix website. No known exploits are currently reported in the wild, but the vulnerability's nature suggests it could be leveraged for DoS attacks against affected services.
Potential Impact
For European organizations using the jmix framework in the specified vulnerable versions, this vulnerability poses a significant risk to service availability. Since jmix is used to develop data-centric Spring Boot applications, many enterprise applications, internal tools, or customer-facing services could be impacted. An attacker uploading large files could cause server storage exhaustion, leading to application crashes or unresponsiveness, disrupting business operations and potentially causing financial and reputational damage. Organizations in sectors such as finance, healthcare, government, and e-commerce, which often rely on Spring Boot applications, may experience service outages. Additionally, the lack of confidentiality or integrity impact means data breaches are unlikely, but the denial of service could be leveraged as part of a broader attack campaign or to distract from other malicious activities. The medium CVSS score (6.5) reflects the moderate risk, primarily due to the ease of exploitation and the impact on availability.
Mitigation Recommendations
European organizations should immediately assess their use of the jmix framework and identify any applications running vulnerable versions (>=1.0.0 and <1.6.2, or >=2.0.0 and <2.4.0). The primary mitigation is to upgrade to patched versions 1.6.2 or 2.4.0 as soon as possible. Until upgrades can be applied, organizations should implement strict file upload size limits at the application or web server level to prevent excessively large files from being accepted. Additionally, monitoring disk usage and setting alerts for abnormal increases can provide early warning signs of exploitation attempts. Implementing rate limiting and authentication controls on file upload endpoints can reduce the risk of abuse. Reviewing and applying the workaround provided in the official Jmix documentation is recommended. Finally, organizations should conduct penetration testing and code reviews to ensure no other resource exhaustion vulnerabilities exist in their customizations or integrations.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-32952: CWE-770: Allocation of Resources Without Limits or Throttling in jmix-framework jmix
Description
Jmix is a set of libraries and tools to speed up Spring Boot data-centric application development. In versions 1.0.0 to 1.6.1 and 2.0.0 to 2.3.4, the local file storage implementation does not restrict the size of uploaded files. An attacker could exploit this by uploading excessively large files, potentially causing the server to run out of space and return HTTP 500 error, resulting in a denial of service. This issue has been patched in versions 1.6.2 and 2.4.0. A workaround is provided on the Jmix documentation website.
AI-Powered Analysis
Technical Analysis
CVE-2025-32952 is a medium severity vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the jmix-framework, a set of libraries and tools designed to accelerate Spring Boot data-centric application development. The vulnerability exists in the local file storage implementation of jmix versions 1.0.0 through 1.6.1 and 2.0.0 through 2.3.4. Specifically, the system does not impose any restrictions on the size of files uploaded by users. An attacker can exploit this by uploading excessively large files, which can exhaust the server's disk space. This resource exhaustion leads to server instability, causing HTTP 500 internal server errors and resulting in a denial of service (DoS) condition. The vulnerability does not impact confidentiality or integrity but severely affects availability. Exploitation requires network access and low privileges (PR:L), with no user interaction needed, making it relatively easy to exploit remotely. The issue has been addressed in versions 1.6.2 and 2.4.0 of jmix, and a workaround is documented on the official Jmix website. No known exploits are currently reported in the wild, but the vulnerability's nature suggests it could be leveraged for DoS attacks against affected services.
Potential Impact
For European organizations using the jmix framework in the specified vulnerable versions, this vulnerability poses a significant risk to service availability. Since jmix is used to develop data-centric Spring Boot applications, many enterprise applications, internal tools, or customer-facing services could be impacted. An attacker uploading large files could cause server storage exhaustion, leading to application crashes or unresponsiveness, disrupting business operations and potentially causing financial and reputational damage. Organizations in sectors such as finance, healthcare, government, and e-commerce, which often rely on Spring Boot applications, may experience service outages. Additionally, the lack of confidentiality or integrity impact means data breaches are unlikely, but the denial of service could be leveraged as part of a broader attack campaign or to distract from other malicious activities. The medium CVSS score (6.5) reflects the moderate risk, primarily due to the ease of exploitation and the impact on availability.
Mitigation Recommendations
European organizations should immediately assess their use of the jmix framework and identify any applications running vulnerable versions (>=1.0.0 and <1.6.2, or >=2.0.0 and <2.4.0). The primary mitigation is to upgrade to patched versions 1.6.2 or 2.4.0 as soon as possible. Until upgrades can be applied, organizations should implement strict file upload size limits at the application or web server level to prevent excessively large files from being accepted. Additionally, monitoring disk usage and setting alerts for abnormal increases can provide early warning signs of exploitation attempts. Implementing rate limiting and authentication controls on file upload endpoints can reduce the risk of abuse. Reviewing and applying the workaround provided in the official Jmix documentation is recommended. Finally, organizations should conduct penetration testing and code reviews to ensure no other resource exhaustion vulnerabilities exist in their customizations or integrations.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-04-14T21:47:11.450Z
- Cisa Enriched
- true
Threat ID: 682d983ec4522896dcbf01a1
Added to database: 5/21/2025, 9:09:18 AM
Last enriched: 7/9/2025, 1:57:37 PM
Last updated: 8/12/2025, 8:26:23 PM
Views: 15
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.