CVE-2025-13165: CWE-770 Allocation of Resources Without Limits or Throttling in Digiwin EasyFlow GP
EasyFlow GP developed by Digiwin has a Denial of service vulnerability, allowing unauthenticated remote attackers to send specific requests that result in denial of web service.
AI Analysis
Technical Summary
CVE-2025-13165 identifies a denial of service (DoS) vulnerability in Digiwin's EasyFlow GP product, specifically in versions 5.7.x, 5.8.8.3, and 8.1.x. The root cause is an allocation of resources without proper limits or throttling, classified under CWE-770. This flaw allows unauthenticated remote attackers to send specially crafted requests that cause the application to consume excessive resources, leading to a denial of web service. The vulnerability does not require any authentication or user interaction, making it easily exploitable remotely. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, no privileges or user interaction needed, and a high impact on availability. Although no public exploits have been reported, the high CVSS score (8.7) indicates a critical risk to service continuity. Digiwin EasyFlow GP is used in enterprise environments for workflow and process automation, so disruption could impact business operations. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for interim mitigations. The vulnerability's technical details confirm it was reserved and published in November 2025 by TW-CERT, indicating credible and verified reporting.
Potential Impact
For European organizations, exploitation of CVE-2025-13165 could result in significant denial of service conditions, disrupting critical business workflows and automated processes managed by EasyFlow GP. This can lead to operational downtime, loss of productivity, and potential financial losses. Organizations in sectors such as manufacturing, logistics, and enterprise IT that rely on Digiwin EasyFlow GP for process automation are particularly vulnerable. The unauthenticated nature of the attack increases the risk of widespread exploitation, including by opportunistic attackers or competitors. Additionally, service outages could indirectly affect supply chains and customer-facing services, amplifying the impact. The lack of known exploits currently provides a window for proactive defense, but the high CVSS score and ease of exploitation underscore the urgency. European entities with regulatory requirements for service availability and incident reporting may face compliance challenges if affected.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, deploy network-level rate limiting and traffic shaping to restrict the volume of requests to EasyFlow GP endpoints, preventing resource exhaustion. Second, configure web application firewalls (WAFs) with custom rules to detect and block anomalous or malformed requests targeting the vulnerable functionality. Third, monitor network and application logs for unusual spikes in traffic or repeated request patterns indicative of exploitation attempts. Fourth, isolate EasyFlow GP servers behind segmented network zones with strict access controls to reduce exposure. Fifth, engage with Digiwin support to obtain any available hotfixes or guidance and plan for timely patch deployment once available. Finally, conduct internal awareness and incident response drills to prepare for potential DoS incidents related to this vulnerability.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-13165: CWE-770 Allocation of Resources Without Limits or Throttling in Digiwin EasyFlow GP
Description
EasyFlow GP developed by Digiwin has a Denial of service vulnerability, allowing unauthenticated remote attackers to send specific requests that result in denial of web service.
AI-Powered Analysis
Technical Analysis
CVE-2025-13165 identifies a denial of service (DoS) vulnerability in Digiwin's EasyFlow GP product, specifically in versions 5.7.x, 5.8.8.3, and 8.1.x. The root cause is an allocation of resources without proper limits or throttling, classified under CWE-770. This flaw allows unauthenticated remote attackers to send specially crafted requests that cause the application to consume excessive resources, leading to a denial of web service. The vulnerability does not require any authentication or user interaction, making it easily exploitable remotely. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N) reflects a network attack vector with low complexity, no privileges or user interaction needed, and a high impact on availability. Although no public exploits have been reported, the high CVSS score (8.7) indicates a critical risk to service continuity. Digiwin EasyFlow GP is used in enterprise environments for workflow and process automation, so disruption could impact business operations. The lack of patch links suggests that a fix may not yet be available, emphasizing the need for interim mitigations. The vulnerability's technical details confirm it was reserved and published in November 2025 by TW-CERT, indicating credible and verified reporting.
Potential Impact
For European organizations, exploitation of CVE-2025-13165 could result in significant denial of service conditions, disrupting critical business workflows and automated processes managed by EasyFlow GP. This can lead to operational downtime, loss of productivity, and potential financial losses. Organizations in sectors such as manufacturing, logistics, and enterprise IT that rely on Digiwin EasyFlow GP for process automation are particularly vulnerable. The unauthenticated nature of the attack increases the risk of widespread exploitation, including by opportunistic attackers or competitors. Additionally, service outages could indirectly affect supply chains and customer-facing services, amplifying the impact. The lack of known exploits currently provides a window for proactive defense, but the high CVSS score and ease of exploitation underscore the urgency. European entities with regulatory requirements for service availability and incident reporting may face compliance challenges if affected.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. First, deploy network-level rate limiting and traffic shaping to restrict the volume of requests to EasyFlow GP endpoints, preventing resource exhaustion. Second, configure web application firewalls (WAFs) with custom rules to detect and block anomalous or malformed requests targeting the vulnerable functionality. Third, monitor network and application logs for unusual spikes in traffic or repeated request patterns indicative of exploitation attempts. Fourth, isolate EasyFlow GP servers behind segmented network zones with strict access controls to reduce exposure. Fifth, engage with Digiwin support to obtain any available hotfixes or guidance and plan for timely patch deployment once available. Finally, conduct internal awareness and incident response drills to prepare for potential DoS incidents related to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- twcert
- Date Reserved
- 2025-11-14T03:31:48.841Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691ac658848ad39aa203c516
Added to database: 11/17/2025, 6:53:12 AM
Last enriched: 11/24/2025, 7:08:40 AM
Last updated: 1/7/2026, 7:32:03 AM
Views: 83
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-31963: CWE-306 Missing Authentication for Critical Function in HCLSoftware BigFix IVR
LowCVE-2025-31962: CWE-613 Insufficient Session Expiration in HCLSoftware BigFix IVR
LowCVE-2026-0656: CWE-862 Missing Authorization in ipaymu iPaymu Payment Gateway for WooCommerce
HighCVE-2025-14904: CWE-352 Cross-Site Request Forgery (CSRF) in anilankola Newsletter Email Subscribe
MediumCVE-2025-14901: CWE-862 Missing Authorization in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational Form & Payment Form builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.