Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13805: Deserialization in nutzam NutzBoot

0
Medium
VulnerabilityCVE-2025-13805cvecve-2025-13805
Published: Mon Dec 01 2025 (12/01/2025, 03:32:06 UTC)
Source: CVE Database V5
Vendor/Project: nutzam
Product: NutzBoot

Description

A weakness has been identified in nutzam NutzBoot up to 2.6.0-SNAPSHOT. This affects the function getInputStream of the file nutzcloud/nutzcloud-literpc/src/main/java/org/nutz/boot/starter/literpc/impl/endpoint/http/HttpServletRpcEndpoint.java of the component LiteRpc-Serializer. Executing manipulation can lead to deserialization. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be exploited.

AI-Powered Analysis

AILast updated: 12/08/2025, 04:29:02 UTC

Technical Analysis

CVE-2025-13805 identifies a deserialization vulnerability in the NutzBoot framework, version 2.6.0-SNAPSHOT and earlier. The vulnerability resides in the getInputStream method within the LiteRpc-Serializer component, specifically in the file HttpServletRpcEndpoint.java. Deserialization flaws occur when untrusted data is processed by the application’s deserialization routines, potentially allowing attackers to execute arbitrary code or manipulate application logic. In this case, remote attackers can send crafted requests to the vulnerable endpoint to trigger unsafe deserialization. The attack vector is network-based (AV:N), with high attack complexity (AC:H), requiring no privileges (PR:N), no user interaction (UI:N), and no authentication. The impact is limited primarily to confidentiality (VC:L), with no direct integrity or availability impact reported. The CVSS 4.0 score of 6.3 reflects a medium severity due to the difficulty of exploitation and limited impact scope. Although a public exploit is available, no confirmed active exploitation in the wild has been reported. The vulnerability affects the NutzBoot framework, which is used in Java-based enterprise applications, particularly those leveraging the Nutzam ecosystem. The lack of patches at the time of reporting necessitates defensive measures to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality, as exploitation could allow attackers to execute arbitrary code or access sensitive data through deserialization attacks. Organizations using NutzBoot in critical infrastructure, financial services, or government applications could face data breaches or unauthorized access. The medium complexity and lack of required privileges reduce the likelihood of widespread exploitation but do not eliminate risk, especially in targeted attacks. The availability of a public exploit increases the urgency for mitigation. Potential impacts include exposure of sensitive information, disruption of application logic, and potential footholds for further network compromise. Given the reliance on Java frameworks in many European enterprises, especially in Germany, France, and the UK, the vulnerability could affect a significant number of systems if not addressed promptly.

Mitigation Recommendations

1. Monitor for and apply official patches or updates from the Nutzam project as soon as they become available. 2. Restrict network access to the affected LiteRpc-Serializer endpoints by implementing firewall rules or network segmentation to limit exposure. 3. Employ strict input validation and sanitization on all incoming data to the getInputStream function to prevent malicious payloads from triggering deserialization. 4. Consider implementing application-layer protections such as deserialization filters or using safer serialization libraries that enforce type whitelisting. 5. Conduct code reviews and security testing focused on deserialization logic within NutzBoot-based applications. 6. Deploy runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious deserialization attempts. 7. Increase monitoring and logging around the vulnerable component to detect potential exploitation attempts early. 8. Educate development and security teams about the risks of unsafe deserialization and best practices for secure coding in Java environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-30T14:12:56.851Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692d142cfcc4df0b650cf5b4

Added to database: 12/1/2025, 4:06:04 AM

Last enriched: 12/8/2025, 4:29:02 AM

Last updated: 1/19/2026, 4:07:21 AM

Views: 78

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats