Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13805: Deserialization in nutzam NutzBoot

0
Medium
VulnerabilityCVE-2025-13805cvecve-2025-13805
Published: Mon Dec 01 2025 (12/01/2025, 03:32:06 UTC)
Source: CVE Database V5
Vendor/Project: nutzam
Product: NutzBoot

Description

A weakness has been identified in nutzam NutzBoot up to 2.6.0-SNAPSHOT. This affects the function getInputStream of the file nutzcloud/nutzcloud-literpc/src/main/java/org/nutz/boot/starter/literpc/impl/endpoint/http/HttpServletRpcEndpoint.java of the component LiteRpc-Serializer. Executing a manipulation can lead to deserialization. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be used for attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:12:18 UTC

Technical Analysis

CVE-2025-13805 identifies a deserialization vulnerability in the NutzBoot framework up to version 2.6.0-SNAPSHOT, specifically within the LiteRpc-Serializer component's getInputStream method located in the HttpServletRpcEndpoint.java file. Deserialization vulnerabilities occur when untrusted data is processed by the application’s deserialization routines, potentially allowing attackers to execute arbitrary code or cause denial of service. In this case, the vulnerability arises from insufficient validation or sanitization of serialized input data received remotely, enabling an attacker to craft malicious serialized objects that the system will deserialize. The attack vector is remote network access without requiring authentication or user interaction, but the exploit complexity is high, making exploitation difficult. The CVSS 4.0 base score is 6.3 (medium), reflecting the limited confidentiality impact and no integrity or availability impact. No known active exploits in the wild have been reported, but a public exploit exists, increasing the risk of future attacks. The vulnerability affects Java-based web applications using NutzBoot’s LiteRpc-Serializer, which is used for remote procedure calls over HTTP. This flaw could be leveraged in targeted attacks against organizations using this framework, especially those exposing vulnerable endpoints to untrusted networks.

Potential Impact

The vulnerability could allow remote attackers to perform deserialization attacks, potentially leading to unauthorized access to sensitive data or limited information disclosure, given the low confidentiality impact rating. However, there is no direct impact on data integrity or system availability. The high complexity and difficulty of exploitation reduce the likelihood of widespread attacks, but the availability of a public exploit increases risk over time. Organizations using NutzBoot in exposed environments may face targeted attacks aiming to exploit this flaw for reconnaissance or lateral movement. The impact is primarily on confidentiality, with a limited scope due to the specific affected component and version. The lack of authentication requirements means attackers can attempt exploitation without credentials, increasing exposure if the vulnerable service is internet-facing.

Mitigation Recommendations

1. Monitor for and apply official patches or updates from the Nutzam project as soon as they become available to address this vulnerability. 2. Restrict network access to the vulnerable LiteRpc-Serializer endpoints by implementing firewall rules or network segmentation to limit exposure to trusted internal networks only. 3. Implement strict input validation and deserialization controls, such as using allowlists for acceptable classes during deserialization or employing safer serialization frameworks that do not allow arbitrary object deserialization. 4. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious serialized payloads targeting the vulnerable endpoint. 5. Conduct code reviews and security testing focused on deserialization logic within the application to identify and remediate similar issues proactively. 6. Monitor security advisories and threat intelligence feeds for exploitation attempts related to CVE-2025-13805 to respond promptly to emerging threats.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-30T14:12:56.851Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692d142cfcc4df0b650cf5b4

Added to database: 12/1/2025, 4:06:04 AM

Last enriched: 2/24/2026, 10:12:18 PM

Last updated: 3/22/2026, 9:39:57 AM

Views: 116

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses