CVE-2025-13435: Path Traversal in Dreampie Resty
A security vulnerability has been detected in Dreampie Resty up to 1.3.1.SNAPSHOT. This affects the function Request of the file /resty-httpclient/src/main/java/cn/dreampie/client/HttpClient.java of the component HttpClient Module. Such manipulation of the argument filename leads to path traversal. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13435 identifies a path traversal vulnerability in the Dreampie Resty HTTP client library, specifically in the Request method of the HttpClient.java source file. This vulnerability arises from insufficient validation or sanitization of the filename parameter, allowing an attacker to manipulate the input to traverse directories outside the intended file path. Such traversal can lead to unauthorized access to sensitive files on the server or client system, potentially exposing configuration files, credentials, or other critical data. The vulnerability affects Dreampie Resty versions up to and including 1.3.1.SNAPSHOT. The attack vector is remote network access with no need for authentication or user interaction, but the attack complexity is high, indicating that exploitation requires advanced skills or specific conditions. The CVSS 4.0 base score is 6.3 (medium severity), reflecting the limited confidentiality, integrity, and availability impact due to the difficulty of exploitation and limited scope. The vendor was contacted early but has not issued a patch or response, and no known exploits have been observed in the wild yet. The public disclosure of this vulnerability increases the risk of exploitation attempts, especially in environments where Dreampie Resty is used in critical HTTP client operations, such as API integrations or microservices communication.
Potential Impact
For European organizations, the impact of CVE-2025-13435 depends on the extent of Dreampie Resty usage within their software stacks. Organizations leveraging this library for HTTP client operations in web applications, microservices, or API integrations may face risks of unauthorized file access if the vulnerability is exploited. This could lead to exposure of sensitive internal files, configuration data, or credentials, potentially facilitating further attacks or data breaches. Although the attack complexity is high and no known exploits exist, the public disclosure and lack of vendor patch increase the risk over time. Industries with high regulatory requirements for data protection, such as finance, healthcare, and government sectors in Europe, could face compliance and reputational damage if exploited. Additionally, organizations relying on third-party software or custom applications embedding Dreampie Resty should audit their dependencies to identify exposure. The vulnerability does not directly impact availability but could compromise confidentiality and integrity of sensitive data.
Mitigation Recommendations
Since no official patch or update is currently available from the vendor, European organizations should take immediate steps to mitigate risk. First, conduct a thorough inventory to identify all instances of Dreampie Resty 1.3.1.SNAPSHOT usage across applications and services. Where feasible, isolate or restrict network access to vulnerable components to limit exposure. Implement strict input validation and sanitization on any user-controllable filename parameters passed to the HttpClient Request function to prevent path traversal attempts. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious path traversal patterns. Monitor logs for unusual file access or error messages indicative of exploitation attempts. Engage with software vendors or development teams to prioritize upgrading or replacing Dreampie Resty with a patched or alternative HTTP client library once available. Consider code review or static analysis to detect similar vulnerabilities in custom code. Finally, maintain heightened awareness and incident response readiness given the public disclosure and potential for future exploit development.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-13435: Path Traversal in Dreampie Resty
Description
A security vulnerability has been detected in Dreampie Resty up to 1.3.1.SNAPSHOT. This affects the function Request of the file /resty-httpclient/src/main/java/cn/dreampie/client/HttpClient.java of the component HttpClient Module. Such manipulation of the argument filename leads to path traversal. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-13435 identifies a path traversal vulnerability in the Dreampie Resty HTTP client library, specifically in the Request method of the HttpClient.java source file. This vulnerability arises from insufficient validation or sanitization of the filename parameter, allowing an attacker to manipulate the input to traverse directories outside the intended file path. Such traversal can lead to unauthorized access to sensitive files on the server or client system, potentially exposing configuration files, credentials, or other critical data. The vulnerability affects Dreampie Resty versions up to and including 1.3.1.SNAPSHOT. The attack vector is remote network access with no need for authentication or user interaction, but the attack complexity is high, indicating that exploitation requires advanced skills or specific conditions. The CVSS 4.0 base score is 6.3 (medium severity), reflecting the limited confidentiality, integrity, and availability impact due to the difficulty of exploitation and limited scope. The vendor was contacted early but has not issued a patch or response, and no known exploits have been observed in the wild yet. The public disclosure of this vulnerability increases the risk of exploitation attempts, especially in environments where Dreampie Resty is used in critical HTTP client operations, such as API integrations or microservices communication.
Potential Impact
For European organizations, the impact of CVE-2025-13435 depends on the extent of Dreampie Resty usage within their software stacks. Organizations leveraging this library for HTTP client operations in web applications, microservices, or API integrations may face risks of unauthorized file access if the vulnerability is exploited. This could lead to exposure of sensitive internal files, configuration data, or credentials, potentially facilitating further attacks or data breaches. Although the attack complexity is high and no known exploits exist, the public disclosure and lack of vendor patch increase the risk over time. Industries with high regulatory requirements for data protection, such as finance, healthcare, and government sectors in Europe, could face compliance and reputational damage if exploited. Additionally, organizations relying on third-party software or custom applications embedding Dreampie Resty should audit their dependencies to identify exposure. The vulnerability does not directly impact availability but could compromise confidentiality and integrity of sensitive data.
Mitigation Recommendations
Since no official patch or update is currently available from the vendor, European organizations should take immediate steps to mitigate risk. First, conduct a thorough inventory to identify all instances of Dreampie Resty 1.3.1.SNAPSHOT usage across applications and services. Where feasible, isolate or restrict network access to vulnerable components to limit exposure. Implement strict input validation and sanitization on any user-controllable filename parameters passed to the HttpClient Request function to prevent path traversal attempts. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious path traversal patterns. Monitor logs for unusual file access or error messages indicative of exploitation attempts. Engage with software vendors or development teams to prioritize upgrading or replacing Dreampie Resty with a patched or alternative HTTP client library once available. Consider code review or static analysis to detect similar vulnerabilities in custom code. Finally, maintain heightened awareness and incident response readiness given the public disclosure and potential for future exploit development.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-19T16:59:38.996Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691e73fd1af65083e67a847f
Added to database: 11/20/2025, 1:50:53 AM
Last enriched: 11/20/2025, 2:05:57 AM
Last updated: 11/20/2025, 4:11:25 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
RCE via a malicious SVG in mPDF
MediumCVE-2025-13451: SQL Injection in SourceCodester Online Shop Project
MediumCVE-2025-13450: Cross Site Scripting in SourceCodester Online Shop Project
MediumCVE-2025-13449: SQL Injection in code-projects Online Shop Project
MediumCVE-2025-13446: Stack-based Buffer Overflow in Tenda AC21
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.