Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13435: Path Traversal in Dreampie Resty

0
Medium
VulnerabilityCVE-2025-13435cvecve-2025-13435
Published: Thu Nov 20 2025 (11/20/2025, 01:32:04 UTC)
Source: CVE Database V5
Vendor/Project: Dreampie
Product: Resty

Description

A security vulnerability has been detected in Dreampie Resty up to 1.3.1.SNAPSHOT. This affects the function Request of the file /resty-httpclient/src/main/java/cn/dreampie/client/HttpClient.java of the component HttpClient Module. Such manipulation of the argument filename leads to path traversal. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 11/20/2025, 02:05:57 UTC

Technical Analysis

CVE-2025-13435 identifies a path traversal vulnerability in the Dreampie Resty HTTP client library, specifically in the Request method of the HttpClient.java source file. This vulnerability arises from insufficient validation or sanitization of the filename parameter, allowing an attacker to manipulate the input to traverse directories outside the intended file path. Such traversal can lead to unauthorized access to sensitive files on the server or client system, potentially exposing configuration files, credentials, or other critical data. The vulnerability affects Dreampie Resty versions up to and including 1.3.1.SNAPSHOT. The attack vector is remote network access with no need for authentication or user interaction, but the attack complexity is high, indicating that exploitation requires advanced skills or specific conditions. The CVSS 4.0 base score is 6.3 (medium severity), reflecting the limited confidentiality, integrity, and availability impact due to the difficulty of exploitation and limited scope. The vendor was contacted early but has not issued a patch or response, and no known exploits have been observed in the wild yet. The public disclosure of this vulnerability increases the risk of exploitation attempts, especially in environments where Dreampie Resty is used in critical HTTP client operations, such as API integrations or microservices communication.

Potential Impact

For European organizations, the impact of CVE-2025-13435 depends on the extent of Dreampie Resty usage within their software stacks. Organizations leveraging this library for HTTP client operations in web applications, microservices, or API integrations may face risks of unauthorized file access if the vulnerability is exploited. This could lead to exposure of sensitive internal files, configuration data, or credentials, potentially facilitating further attacks or data breaches. Although the attack complexity is high and no known exploits exist, the public disclosure and lack of vendor patch increase the risk over time. Industries with high regulatory requirements for data protection, such as finance, healthcare, and government sectors in Europe, could face compliance and reputational damage if exploited. Additionally, organizations relying on third-party software or custom applications embedding Dreampie Resty should audit their dependencies to identify exposure. The vulnerability does not directly impact availability but could compromise confidentiality and integrity of sensitive data.

Mitigation Recommendations

Since no official patch or update is currently available from the vendor, European organizations should take immediate steps to mitigate risk. First, conduct a thorough inventory to identify all instances of Dreampie Resty 1.3.1.SNAPSHOT usage across applications and services. Where feasible, isolate or restrict network access to vulnerable components to limit exposure. Implement strict input validation and sanitization on any user-controllable filename parameters passed to the HttpClient Request function to prevent path traversal attempts. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious path traversal patterns. Monitor logs for unusual file access or error messages indicative of exploitation attempts. Engage with software vendors or development teams to prioritize upgrading or replacing Dreampie Resty with a patched or alternative HTTP client library once available. Consider code review or static analysis to detect similar vulnerabilities in custom code. Finally, maintain heightened awareness and incident response readiness given the public disclosure and potential for future exploit development.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-19T16:59:38.996Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691e73fd1af65083e67a847f

Added to database: 11/20/2025, 1:50:53 AM

Last enriched: 11/20/2025, 2:05:57 AM

Last updated: 11/20/2025, 4:11:25 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats