Логотип exploitDog
bind:CVE-2025-32961
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-32961

Количество 2

Количество 2

nvd логотип

CVE-2025-32961

10 месяцев назад

The Cuba JPA web API enables loading and saving any entities defined in the application data model by sending simple HTTP requests. Prior to version 1.1.1, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in version 1.1.1. A workaround is provided on the Jmix documentation website.

CVSS3: 6.4
EPSS: Низкий
github логотип

GHSA-hg25-w3vg-7279

10 месяцев назад

XSS in the /download Endpoint of the JPA Web API

CVSS3: 6.4
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-32961

The Cuba JPA web API enables loading and saving any entities defined in the application data model by sending simple HTTP requests. Prior to version 1.1.1, the input parameter, which consists of a file path and name, can be manipulated to return the Content-Type header with text/html if the name part ends with .html. This could allow malicious JavaScript code to be executed in the browser. For a successful attack, a malicious file needs to be uploaded beforehand. This issue has been patched in version 1.1.1. A workaround is provided on the Jmix documentation website.

CVSS3: 6.4
0%
Низкий
10 месяцев назад
github логотип
GHSA-hg25-w3vg-7279

XSS in the /download Endpoint of the JPA Web API

CVSS3: 6.4
0%
Низкий
10 месяцев назад

Уязвимостей на страницу