CVE-2025-13805: Deserialization in nutzam NutzBoot
A weakness has been identified in nutzam NutzBoot up to 2.6.0-SNAPSHOT. This affects the function getInputStream of the file nutzcloud/nutzcloud-literpc/src/main/java/org/nutz/boot/starter/literpc/impl/endpoint/http/HttpServletRpcEndpoint.java of the component LiteRpc-Serializer. Executing a manipulation can lead to deserialization. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be used for attacks.
AI Analysis
Technical Summary
CVE-2025-13805 identifies a deserialization vulnerability in the NutzBoot framework up to version 2.6.0-SNAPSHOT, specifically within the LiteRpc-Serializer component's getInputStream method located in the HttpServletRpcEndpoint.java file. Deserialization vulnerabilities occur when untrusted data is processed by the application’s deserialization routines, potentially allowing attackers to execute arbitrary code or cause denial of service. In this case, the vulnerability arises from insufficient validation or sanitization of serialized input data received remotely, enabling an attacker to craft malicious serialized objects that the system will deserialize. The attack vector is remote network access without requiring authentication or user interaction, but the exploit complexity is high, making exploitation difficult. The CVSS 4.0 base score is 6.3 (medium), reflecting the limited confidentiality impact and no integrity or availability impact. No known active exploits in the wild have been reported, but a public exploit exists, increasing the risk of future attacks. The vulnerability affects Java-based web applications using NutzBoot’s LiteRpc-Serializer, which is used for remote procedure calls over HTTP. This flaw could be leveraged in targeted attacks against organizations using this framework, especially those exposing vulnerable endpoints to untrusted networks.
Potential Impact
The vulnerability could allow remote attackers to perform deserialization attacks, potentially leading to unauthorized access to sensitive data or limited information disclosure, given the low confidentiality impact rating. However, there is no direct impact on data integrity or system availability. The high complexity and difficulty of exploitation reduce the likelihood of widespread attacks, but the availability of a public exploit increases risk over time. Organizations using NutzBoot in exposed environments may face targeted attacks aiming to exploit this flaw for reconnaissance or lateral movement. The impact is primarily on confidentiality, with a limited scope due to the specific affected component and version. The lack of authentication requirements means attackers can attempt exploitation without credentials, increasing exposure if the vulnerable service is internet-facing.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the Nutzam project as soon as they become available to address this vulnerability. 2. Restrict network access to the vulnerable LiteRpc-Serializer endpoints by implementing firewall rules or network segmentation to limit exposure to trusted internal networks only. 3. Implement strict input validation and deserialization controls, such as using allowlists for acceptable classes during deserialization or employing safer serialization frameworks that do not allow arbitrary object deserialization. 4. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious serialized payloads targeting the vulnerable endpoint. 5. Conduct code reviews and security testing focused on deserialization logic within the application to identify and remediate similar issues proactively. 6. Monitor security advisories and threat intelligence feeds for exploitation attempts related to CVE-2025-13805 to respond promptly to emerging threats.
Affected Countries
United States, China, Germany, Japan, South Korea, India, United Kingdom, France, Canada, Australia
CVE-2025-13805: Deserialization in nutzam NutzBoot
Description
A weakness has been identified in nutzam NutzBoot up to 2.6.0-SNAPSHOT. This affects the function getInputStream of the file nutzcloud/nutzcloud-literpc/src/main/java/org/nutz/boot/starter/literpc/impl/endpoint/http/HttpServletRpcEndpoint.java of the component LiteRpc-Serializer. Executing a manipulation can lead to deserialization. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be used for attacks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-13805 identifies a deserialization vulnerability in the NutzBoot framework up to version 2.6.0-SNAPSHOT, specifically within the LiteRpc-Serializer component's getInputStream method located in the HttpServletRpcEndpoint.java file. Deserialization vulnerabilities occur when untrusted data is processed by the application’s deserialization routines, potentially allowing attackers to execute arbitrary code or cause denial of service. In this case, the vulnerability arises from insufficient validation or sanitization of serialized input data received remotely, enabling an attacker to craft malicious serialized objects that the system will deserialize. The attack vector is remote network access without requiring authentication or user interaction, but the exploit complexity is high, making exploitation difficult. The CVSS 4.0 base score is 6.3 (medium), reflecting the limited confidentiality impact and no integrity or availability impact. No known active exploits in the wild have been reported, but a public exploit exists, increasing the risk of future attacks. The vulnerability affects Java-based web applications using NutzBoot’s LiteRpc-Serializer, which is used for remote procedure calls over HTTP. This flaw could be leveraged in targeted attacks against organizations using this framework, especially those exposing vulnerable endpoints to untrusted networks.
Potential Impact
The vulnerability could allow remote attackers to perform deserialization attacks, potentially leading to unauthorized access to sensitive data or limited information disclosure, given the low confidentiality impact rating. However, there is no direct impact on data integrity or system availability. The high complexity and difficulty of exploitation reduce the likelihood of widespread attacks, but the availability of a public exploit increases risk over time. Organizations using NutzBoot in exposed environments may face targeted attacks aiming to exploit this flaw for reconnaissance or lateral movement. The impact is primarily on confidentiality, with a limited scope due to the specific affected component and version. The lack of authentication requirements means attackers can attempt exploitation without credentials, increasing exposure if the vulnerable service is internet-facing.
Mitigation Recommendations
1. Monitor for and apply official patches or updates from the Nutzam project as soon as they become available to address this vulnerability. 2. Restrict network access to the vulnerable LiteRpc-Serializer endpoints by implementing firewall rules or network segmentation to limit exposure to trusted internal networks only. 3. Implement strict input validation and deserialization controls, such as using allowlists for acceptable classes during deserialization or employing safer serialization frameworks that do not allow arbitrary object deserialization. 4. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious serialized payloads targeting the vulnerable endpoint. 5. Conduct code reviews and security testing focused on deserialization logic within the application to identify and remediate similar issues proactively. 6. Monitor security advisories and threat intelligence feeds for exploitation attempts related to CVE-2025-13805 to respond promptly to emerging threats.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-30T14:12:56.851Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692d142cfcc4df0b650cf5b4
Added to database: 12/1/2025, 4:06:04 AM
Last enriched: 2/24/2026, 10:12:18 PM
Last updated: 3/22/2026, 9:39:57 AM
Views: 116
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.