CVE-2025-13804 Overview
A security flaw has been discovered in nutzam NutzBoot up to version 2.6.0-SNAPSHOT. The impacted element is an unknown function of the file nutzboot-demo/nutzboot-demo-simple/nutzboot-demo-simple-web3j/src/main/java/io/nutz/demo/simple/module/EthModule.java of the component Ethereum Wallet Handler. Performing manipulation results in information disclosure. The attack may be initiated remotely. The exploit has been released to the public and may be exploited.
This vulnerability is classified as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), which allows attackers to gain access to sensitive information that should be restricted.
Critical Impact
Remote attackers can exploit this information disclosure vulnerability in the Ethereum Wallet Handler component to potentially access sensitive wallet-related data without proper authorization.
Affected Products
- NutzBoot up to version 2.6.0-SNAPSHOT
- NutzBoot Demo Simple Web3j component
- EthModule.java in Ethereum Wallet Handler
Discovery Timeline
- 2025-12-01 - CVE-2025-13804 published to NVD
- 2025-12-01 - Last updated in NVD database
Technical Details for CVE-2025-13804
Vulnerability Analysis
This vulnerability affects the Ethereum Wallet Handler component within NutzBoot's demonstration module. The affected file is located at nutzboot-demo/nutzboot-demo-simple/nutzboot-demo-simple-web3j/src/main/java/io/nutz/demo/simple/module/EthModule.java.
The vulnerability carries a CVSS 4.0 score of 5.3 (MEDIUM severity) with the following vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X.
The EPSS (Exploit Prediction Scoring System) score is 0.03% with a percentile of 8.01, indicating relatively low probability of exploitation in the wild despite the public availability of exploit information.
Root Cause
The root cause of this vulnerability stems from improper handling of sensitive information within the Ethereum Wallet Handler component. The EthModule.java file contains functionality that does not adequately protect sensitive wallet-related data, allowing unauthorized information disclosure when manipulated by an attacker.
The vulnerability falls under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), which occurs when an application unintentionally reveals sensitive information to actors who are not explicitly authorized to have access to that information.
Attack Vector
The attack vector is network-based (AV:N) with low attack complexity (AC:L). The exploitation requires low privileges (PR:L) and no user interaction (UI:N).
The vulnerability can be exploited by:
- An attacker with low-level access to the application remotely accessing the vulnerable Ethereum Wallet Handler endpoint
- Manipulating requests to the affected EthModule.java component
- Extracting sensitive information that should be restricted from the response
For detailed technical analysis and proof of concept information, refer to the external security report available at the GitHub repository linked in the references section.
Detection Methods for CVE-2025-13804
Indicators of Compromise
- Unusual access patterns to the Ethereum Wallet Handler endpoints
- Unexpected queries or requests targeting the EthModule.java functionality
- Anomalous response sizes or data returned from Web3j-related API calls
- Unauthorized access attempts to wallet-related endpoints with low-privilege credentials
Detection Strategies
Organizations should implement the following detection strategies:
Log Analysis: Monitor application logs for unusual access patterns to the Ethereum module endpoints. Look for repeated requests that may indicate reconnaissance or exploitation attempts.
Network Traffic Monitoring: Inspect network traffic for requests targeting the vulnerable component paths, particularly those accessing /nutzboot-demo/ related endpoints.
Response Analysis: Monitor for responses containing sensitive wallet information that should not be exposed to low-privilege users.
Behavioral Analysis: Implement anomaly detection to identify unusual user behavior patterns when interacting with the Ethereum Wallet Handler.
Monitoring Recommendations
- Enable detailed logging for all requests to the Web3j and Ethereum wallet components
- Configure alerts for access attempts from unexpected sources or with unusual parameters
- Implement rate limiting on sensitive endpoints to slow potential exploitation attempts
- Deploy application-level monitoring to track data exposure from the affected module
- Utilize SIEM solutions to correlate events and identify potential attack patterns
How to Mitigate CVE-2025-13804
Immediate Actions Required
- Review and restrict access to the Ethereum Wallet Handler component (EthModule.java)
- Implement proper authorization checks on all wallet-related endpoints
- Audit existing access logs for signs of exploitation
- Consider disabling the demo module in production environments if not required
- Apply input validation and output encoding to prevent information leakage
Patch Information
At the time of this publication, organizations should monitor the official NutzBoot repository and security advisories for an official patch. The affected versions include NutzBoot up to 2.6.0-SNAPSHOT.
For more information regarding this vulnerability, consult the following resources:
Workarounds
Until an official patch is available, organizations should implement the following workarounds:
Disable Demo Modules: If using NutzBoot in production, ensure that demo modules (particularly nutzboot-demo-simple-web3j) are not deployed or accessible.
Access Control: Implement strict access controls to limit who can interact with Ethereum wallet functionality:
// Example access control implementation for EthModule
// Add proper authentication and authorization checks
@At("/eth/*")
@Filters(@By(type = AuthenticationFilter.class))
public class EthModule {
// Implement role-based access control
// Validate user permissions before processing wallet operations
}
Network Segmentation: Isolate systems running the vulnerable component from untrusted networks.
Web Application Firewall: Configure WAF rules to filter and block potentially malicious requests targeting the vulnerable endpoint patterns.
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

