Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13806: Improper Authorization in nutzam NutzBoot

0
Medium
VulnerabilityCVE-2025-13806cvecve-2025-13806
Published: Mon Dec 01 2025 (12/01/2025, 04:02:06 UTC)
Source: CVE Database V5
Vendor/Project: nutzam
Product: NutzBoot

Description

A security vulnerability has been detected in nutzam NutzBoot up to 2.6.0-SNAPSHOT. This impacts an unknown function of the file nutzboot-demo/nutzboot-demo-simple/nutzboot-demo-simple-web3j/src/main/java/io/nutz/demo/simple/module/EthModule.java of the component Transaction API. The manipulation of the argument from/to/wei leads to improper authorization. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 22:12:30 UTC

Technical Analysis

CVE-2025-13806 is an improper authorization vulnerability identified in the NutzBoot framework, specifically affecting versions up to 2.6.0-SNAPSHOT. The vulnerability resides in the Transaction API component, within the EthModule.java source file of the nutzboot-demo-simple-web3j module. The flaw is triggered by manipulation of the 'from', 'to', and 'wei' arguments, which are parameters typically used in Ethereum transactions to specify sender, recipient, and transaction value respectively. Due to insufficient authorization checks on these parameters, an attacker can remotely exploit this vulnerability without requiring authentication or user interaction, potentially allowing unauthorized transaction creation or modification. The CVSS 4.0 score of 6.9 reflects a medium severity, considering the network attack vector, low complexity, no privileges or user interaction needed, and partial impact on confidentiality, integrity, and availability. Although no active exploits have been reported in the wild, the public disclosure of the vulnerability increases the risk of exploitation. The vulnerability does not affect the scope beyond the NutzBoot application itself and does not require elevated privileges, making it accessible to remote attackers. This vulnerability is particularly relevant for applications leveraging NutzBoot for blockchain or Ethereum transaction processing, where unauthorized transaction manipulation can lead to financial loss or data integrity issues.

Potential Impact

The improper authorization vulnerability in NutzBoot's Transaction API can have significant impacts on organizations relying on this framework for blockchain or Ethereum-related applications. Unauthorized manipulation of transaction parameters could allow attackers to initiate fraudulent transactions, redirect funds, or disrupt transaction processing, leading to financial losses and reputational damage. The partial compromise of confidentiality, integrity, and availability could undermine trust in blockchain operations and smart contract executions. Organizations may face regulatory and compliance risks if unauthorized transactions lead to data breaches or financial discrepancies. The medium severity indicates that while the vulnerability is exploitable remotely without authentication, the impact is somewhat contained to the affected NutzBoot deployments. However, given the increasing adoption of blockchain technologies, even localized exploitation could have cascading effects in financial and decentralized application ecosystems.

Mitigation Recommendations

To mitigate CVE-2025-13806, organizations should first monitor for any official patches or updates from the Nutzam project and apply them promptly once available. In the interim, restrict network access to the vulnerable Transaction API endpoints to trusted users and systems only, using firewall rules or API gateways. Implement strict input validation and sanitization on the 'from', 'to', and 'wei' parameters to detect and block unauthorized or malformed requests. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules targeting suspicious transaction parameter manipulations. Conduct thorough code reviews and security testing on any custom modules interacting with NutzBoot's Transaction API. Additionally, monitor transaction logs for anomalies such as unexpected sender or recipient addresses and unusual transaction values. Educate developers and administrators about the vulnerability to ensure rapid detection and response. Finally, consider isolating blockchain transaction processing components to minimize the blast radius of potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-30T14:12:59.907Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692d19cffcc4df0b65192240

Added to database: 12/1/2025, 4:30:07 AM

Last enriched: 2/24/2026, 10:12:30 PM

Last updated: 3/23/2026, 10:51:42 PM

Views: 150

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses