CVE-2025-13435: Path Traversal in Dreampie Resty
A security vulnerability has been detected in Dreampie Resty up to 1.3.1.SNAPSHOT. This affects the function Request of the file /resty-httpclient/src/main/java/cn/dreampie/client/HttpClient.java of the component HttpClient Module. Such manipulation of the argument filename leads to path traversal. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13435 identifies a path traversal vulnerability in the Dreampie Resty HTTP client, specifically in the Request function within the HttpClient.java file of the HttpClient module. The vulnerability arises from improper sanitization of the filename argument, allowing an attacker to manipulate the file path and access files outside the intended directory structure. This can lead to unauthorized disclosure of sensitive files on the server hosting the vulnerable component. The vulnerability affects Dreampie Resty versions up to 1.3.1.SNAPSHOT. The attack vector is remote network access without requiring authentication or user interaction, but the attack complexity is high, indicating that exploitation requires detailed knowledge of the target environment and careful crafting of requests. The CVSS 4.0 base score is 6.3, reflecting medium severity with network attack vector, high attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability. The vendor has not responded to early notifications, and no official patches or mitigations have been published. Although no known exploits are currently observed in the wild, the public disclosure increases the risk of exploitation attempts. The vulnerability primarily threatens confidentiality by enabling unauthorized file access, potentially exposing sensitive configuration files, credentials, or other critical data. The lack of vendor response and patch availability heightens the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations, the primary impact of CVE-2025-13435 is the potential unauthorized disclosure of sensitive information stored on servers running vulnerable versions of Dreampie Resty. This can lead to data breaches, intellectual property theft, and exposure of credentials or internal configuration files, which may facilitate further attacks. Organizations relying on Dreampie Resty for web services, API clients, or internal tooling are at risk. The medium severity score reflects moderate risk, but the absence of patches and vendor support increases exposure. Regulatory frameworks such as GDPR impose strict data protection requirements, so data leaks resulting from exploitation could lead to significant legal and financial consequences. The complexity of exploitation reduces the likelihood of widespread automated attacks but does not eliminate targeted attacks against high-value entities. Additionally, the vulnerability could be leveraged as a foothold for lateral movement or privilege escalation if sensitive files contain credentials or secrets. Overall, the threat poses a tangible risk to confidentiality and operational security in affected environments.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement immediate compensating controls. First, enforce strict input validation and sanitization on all filename or path parameters used by Dreampie Resty to prevent path traversal sequences such as '../'. Implement allowlisting of acceptable file paths and deny any input that attempts to navigate outside designated directories. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) configured to detect and block path traversal patterns in HTTP requests. Restrict file system permissions for the application to the minimum necessary, ensuring it cannot access sensitive directories or files even if path traversal is attempted. Conduct thorough code reviews and consider upgrading or replacing Dreampie Resty with alternative HTTP clients that do not exhibit this vulnerability. Monitor logs for anomalous access patterns or errors indicative of exploitation attempts. Finally, maintain an incident response plan to quickly address any detected exploitation and notify relevant data protection authorities if sensitive data exposure occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-13435: Path Traversal in Dreampie Resty
Description
A security vulnerability has been detected in Dreampie Resty up to 1.3.1.SNAPSHOT. This affects the function Request of the file /resty-httpclient/src/main/java/cn/dreampie/client/HttpClient.java of the component HttpClient Module. Such manipulation of the argument filename leads to path traversal. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-13435 identifies a path traversal vulnerability in the Dreampie Resty HTTP client, specifically in the Request function within the HttpClient.java file of the HttpClient module. The vulnerability arises from improper sanitization of the filename argument, allowing an attacker to manipulate the file path and access files outside the intended directory structure. This can lead to unauthorized disclosure of sensitive files on the server hosting the vulnerable component. The vulnerability affects Dreampie Resty versions up to 1.3.1.SNAPSHOT. The attack vector is remote network access without requiring authentication or user interaction, but the attack complexity is high, indicating that exploitation requires detailed knowledge of the target environment and careful crafting of requests. The CVSS 4.0 base score is 6.3, reflecting medium severity with network attack vector, high attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability. The vendor has not responded to early notifications, and no official patches or mitigations have been published. Although no known exploits are currently observed in the wild, the public disclosure increases the risk of exploitation attempts. The vulnerability primarily threatens confidentiality by enabling unauthorized file access, potentially exposing sensitive configuration files, credentials, or other critical data. The lack of vendor response and patch availability heightens the urgency for organizations to implement compensating controls.
Potential Impact
For European organizations, the primary impact of CVE-2025-13435 is the potential unauthorized disclosure of sensitive information stored on servers running vulnerable versions of Dreampie Resty. This can lead to data breaches, intellectual property theft, and exposure of credentials or internal configuration files, which may facilitate further attacks. Organizations relying on Dreampie Resty for web services, API clients, or internal tooling are at risk. The medium severity score reflects moderate risk, but the absence of patches and vendor support increases exposure. Regulatory frameworks such as GDPR impose strict data protection requirements, so data leaks resulting from exploitation could lead to significant legal and financial consequences. The complexity of exploitation reduces the likelihood of widespread automated attacks but does not eliminate targeted attacks against high-value entities. Additionally, the vulnerability could be leveraged as a foothold for lateral movement or privilege escalation if sensitive files contain credentials or secrets. Overall, the threat poses a tangible risk to confidentiality and operational security in affected environments.
Mitigation Recommendations
Given the lack of official patches, European organizations should implement immediate compensating controls. First, enforce strict input validation and sanitization on all filename or path parameters used by Dreampie Resty to prevent path traversal sequences such as '../'. Implement allowlisting of acceptable file paths and deny any input that attempts to navigate outside designated directories. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) configured to detect and block path traversal patterns in HTTP requests. Restrict file system permissions for the application to the minimum necessary, ensuring it cannot access sensitive directories or files even if path traversal is attempted. Conduct thorough code reviews and consider upgrading or replacing Dreampie Resty with alternative HTTP clients that do not exhibit this vulnerability. Monitor logs for anomalous access patterns or errors indicative of exploitation attempts. Finally, maintain an incident response plan to quickly address any detected exploitation and notify relevant data protection authorities if sensitive data exposure occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-19T16:59:38.996Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 691e73fd1af65083e67a847f
Added to database: 11/20/2025, 1:50:53 AM
Last enriched: 11/27/2025, 4:52:59 AM
Last updated: 1/7/2026, 10:25:49 AM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68637: CWE-297 Improper Validation of Certificate with Host Mismatch in Apache Software Foundation Apache Uniffle
UnknownCVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.