CVE-2025-32961
BaseFortify
Publication date: 2025-04-22
Last updated on: 2025-04-23
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a low-severity cross-site scripting (XSS) issue in the Cuba JPA Web APIβs /download endpoint. The problem occurs because the input parameterβwhich contains a file path and nameβcan be manipulated so that, if the file name ends with .html, the Content-Type header is set to 'text/html'. When a malicious file is already uploaded, this behavior can cause the browser to execute malicious JavaScript code. The issue affects versions earlier than 1.1.1, and it has been fixed in version 1.1.1. A temporary workaround is available by disabling the Files Endpoint in the CUBA Application. [4]
How can this vulnerability impact me?
If exploited, this vulnerability could allow an attacker to execute malicious JavaScript code in your browser by tricking the system into serving a file with a misleading Content-Type header. This may lead to issues such as session hijacking or other unauthorized actions in the browser. However, the risk is somewhat reduced by the usual authentication requirements for accessing the application UI and API. [4]
What immediate steps should I take to mitigate this vulnerability?
Upgrade the JPA Web API to version 1.1.1 to patch the vulnerability. If upgrading immediately is not possible, apply the temporary workaround by disabling the Files Endpoint in the CUBA Application. [2, 4]