CVE-2025-13805

A weakness has been identified in nutzam NutzBoot up to 2.6.0-SNAPSHOT. This affects the function getInputStream of the file nutzcloud/nutzcloud-literpc/src/main/java/org/nutz/boot/starter/literpc/impl/endpoint/http/HttpServletRpcEndpoint.java of the component LiteRpc-Serializer. Executing a manipulation can lead to deserialization. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be used for attacks.
Configurations

No configuration.

History

24 Feb 2026, 07:16

Type Values Removed Values Added
Summary
  • (es) Se ha identificado una vulnerabilidad en nutzam NutzBoot hasta la versión 2.6.0-SNAPSHOT. Esto afecta a la función getInputStream del archivo nutzcloud/nutzcloud-literpc/src/main/java/org/nutz/boot/starter/literpc/impl/endpoint/http/HttpServletRpcEndpoint.java del componente LiteRpc-Serializer. La ejecución de manipulación puede conducir a deserialización. El ataque puede lanzarse de forma remota. Este ataque se caracteriza por una alta complejidad. La explotabilidad se reporta como difícil. El exploit se ha puesto a disposición del público y podría ser explotado.
Summary (en) A weakness has been identified in nutzam NutzBoot up to 2.6.0-SNAPSHOT. This affects the function getInputStream of the file nutzcloud/nutzcloud-literpc/src/main/java/org/nutz/boot/starter/literpc/impl/endpoint/http/HttpServletRpcEndpoint.java of the component LiteRpc-Serializer. Executing manipulation can lead to deserialization. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be exploited. (en) A weakness has been identified in nutzam NutzBoot up to 2.6.0-SNAPSHOT. This affects the function getInputStream of the file nutzcloud/nutzcloud-literpc/src/main/java/org/nutz/boot/starter/literpc/impl/endpoint/http/HttpServletRpcEndpoint.java of the component LiteRpc-Serializer. Executing a manipulation can lead to deserialization. The attack may be launched remotely. This attack is characterized by high complexity. The exploitability is reported as difficult. The exploit has been made available to the public and could be used for attacks.

01 Dec 2025, 04:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-01 04:16

Updated : 2026-02-24 07:16


NVD link : CVE-2025-13805

Mitre link : CVE-2025-13805

CVE.ORG link : CVE-2025-13805


JSON object : View

Products Affected

No product.

CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data