VYPR
Medium severity5.6NVD Advisory· Published Nov 20, 2025· Updated Apr 29, 2026

CVE-2025-13435

CVE-2025-13435

Description

A security vulnerability has been detected in Dreampie Resty up to 1.3.1.SNAPSHOT. This affects the function Request of the file /resty-httpclient/src/main/java/cn/dreampie/client/HttpClient.java of the component HttpClient Module. Such manipulation of the argument filename leads to path traversal. The attack may be performed from remote. Attacks of this nature are highly complex. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Dreampie Resty up to 1.3.1.SNAPSHOT's HttpClient module has a path traversal vulnerability via the filename argument, allowing remote arbitrary file write.

Vulnerability

A path traversal vulnerability exists in the Dreampie Resty framework's HttpClient module, specifically in the Request function of /resty-httpclient/src/main/java/cn/dreampie/client/HttpClient.java. The filename argument is not sanitized, enabling an attacker to control the file path when writing HTTP response bodies to disk [2][3].

Exploitation

Exploitation requires the attacker to control the HTTP server the client connects to, perform a Man-in-the-Middle attack, or have the application use a user-configurable download source [2]. The attack is remote, highly complex, and does not require authentication [3].

Impact

Successful exploitation allows arbitrary file write, which can lead to code execution (e.g., deploying webshells), privilege escalation, or denial of service [2].

Mitigation

As of November 2025, no patch is available from the vendor, who did not respond to disclosure [2][3]. Users should consider limiting HttpClient usage to trusted sources or implementing additional input validation.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
cn.dreampie:restyMaven
<= 1.3.1.SNAPSHOT

Affected products

2
  • Dreampie/Resty2 versions
    cpe:2.3:a:dreampie:resty:*:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:dreampie:resty:*:*:*:*:*:*:*:*range: <=1.3.1
    • (no CPE)range: <=1.3.1.SNAPSHOT

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.