Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13435: Path Traversal in Dreampie Resty

0
Medium
VulnerabilityCVE-2025-13435cvecve-2025-13435
Published: Thu Nov 20 2025 (11/20/2025, 01:32:04 UTC)
Source: CVE Database V5
Vendor/Project: Dreampie
Product: Resty

Description

A security vulnerability has been detected in Dreampie Resty up to 1.3.1.SNAPSHOT. This affects the function Request of the file /resty-httpclient/src/main/java/cn/dreampie/client/HttpClient.java of the component HttpClient Module. Such manipulation of the argument filename leads to path traversal. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 11/27/2025, 04:52:59 UTC

Technical Analysis

CVE-2025-13435 identifies a path traversal vulnerability in the Dreampie Resty HTTP client, specifically in the Request function within the HttpClient.java file of the HttpClient module. The vulnerability arises from improper sanitization of the filename argument, allowing an attacker to manipulate the file path and access files outside the intended directory structure. This can lead to unauthorized disclosure of sensitive files on the server hosting the vulnerable component. The vulnerability affects Dreampie Resty versions up to 1.3.1.SNAPSHOT. The attack vector is remote network access without requiring authentication or user interaction, but the attack complexity is high, indicating that exploitation requires detailed knowledge of the target environment and careful crafting of requests. The CVSS 4.0 base score is 6.3, reflecting medium severity with network attack vector, high attack complexity, no privileges or user interaction required, and low impact on confidentiality, integrity, and availability. The vendor has not responded to early notifications, and no official patches or mitigations have been published. Although no known exploits are currently observed in the wild, the public disclosure increases the risk of exploitation attempts. The vulnerability primarily threatens confidentiality by enabling unauthorized file access, potentially exposing sensitive configuration files, credentials, or other critical data. The lack of vendor response and patch availability heightens the urgency for organizations to implement compensating controls.

Potential Impact

For European organizations, the primary impact of CVE-2025-13435 is the potential unauthorized disclosure of sensitive information stored on servers running vulnerable versions of Dreampie Resty. This can lead to data breaches, intellectual property theft, and exposure of credentials or internal configuration files, which may facilitate further attacks. Organizations relying on Dreampie Resty for web services, API clients, or internal tooling are at risk. The medium severity score reflects moderate risk, but the absence of patches and vendor support increases exposure. Regulatory frameworks such as GDPR impose strict data protection requirements, so data leaks resulting from exploitation could lead to significant legal and financial consequences. The complexity of exploitation reduces the likelihood of widespread automated attacks but does not eliminate targeted attacks against high-value entities. Additionally, the vulnerability could be leveraged as a foothold for lateral movement or privilege escalation if sensitive files contain credentials or secrets. Overall, the threat poses a tangible risk to confidentiality and operational security in affected environments.

Mitigation Recommendations

Given the lack of official patches, European organizations should implement immediate compensating controls. First, enforce strict input validation and sanitization on all filename or path parameters used by Dreampie Resty to prevent path traversal sequences such as '../'. Implement allowlisting of acceptable file paths and deny any input that attempts to navigate outside designated directories. Employ runtime application self-protection (RASP) or web application firewalls (WAFs) configured to detect and block path traversal patterns in HTTP requests. Restrict file system permissions for the application to the minimum necessary, ensuring it cannot access sensitive directories or files even if path traversal is attempted. Conduct thorough code reviews and consider upgrading or replacing Dreampie Resty with alternative HTTP clients that do not exhibit this vulnerability. Monitor logs for anomalous access patterns or errors indicative of exploitation attempts. Finally, maintain an incident response plan to quickly address any detected exploitation and notify relevant data protection authorities if sensitive data exposure occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-19T16:59:38.996Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691e73fd1af65083e67a847f

Added to database: 11/20/2025, 1:50:53 AM

Last enriched: 11/27/2025, 4:52:59 AM

Last updated: 1/7/2026, 10:25:49 AM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats