CVE-2025-13875: Path Traversal in Yohann0617 oci-helper
A weakness has been identified in Yohann0617 oci-helper up to 3.2.4. This issue affects the function addCfg of the file src/main/java/com/yohann/ocihelper/service/impl/OciServiceImpl.java of the component OCI Configuration Upload. Executing manipulation of the argument File can lead to path traversal. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13875 identifies a path traversal vulnerability in the oci-helper utility developed by Yohann0617, specifically in versions 3.2.0 through 3.2.4. The vulnerability resides in the addCfg function within the OCI Configuration Upload component, implemented in the OciServiceImpl.java source file. This flaw allows an attacker to manipulate the file argument passed to the function, enabling traversal outside the intended directory structure. Such manipulation can lead to unauthorized reading or potentially overwriting of arbitrary files on the host system. The attack vector is remote, requiring no user interaction, but does require low-level privileges (PR:L) on the system. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability. Although the vendor was notified early, they have not issued any patches or advisories, and no known exploits have been observed in the wild yet. The availability of proof-of-concept exploit code increases the risk of future exploitation. This vulnerability is particularly concerning for environments that rely on oci-helper for managing OCI configurations, as it could allow attackers to access sensitive configuration files or system files, potentially leading to further compromise.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive configuration files or system data, impacting confidentiality and integrity. Organizations using oci-helper in their cloud infrastructure management or container orchestration pipelines may face risks of lateral movement or privilege escalation if attackers leverage this flaw. Although the impact on availability is low, the breach of sensitive configuration data could undermine trust and compliance with data protection regulations such as GDPR. The lack of vendor response and patches increases the window of exposure. Industries with critical cloud deployments, such as finance, healthcare, and manufacturing, could be particularly affected. The medium severity rating suggests moderate risk, but the potential for escalation or chaining with other vulnerabilities could increase the overall threat level.
Mitigation Recommendations
Immediate mitigation steps include restricting network access to the oci-helper service to trusted administrators only, implementing strict file system permissions to limit the scope of accessible files, and monitoring logs for unusual file access patterns indicative of path traversal attempts. Organizations should conduct thorough audits of systems running vulnerable versions and isolate them if possible. Employing application-layer firewalls or intrusion detection systems with custom rules to detect path traversal payloads can help detect exploitation attempts. Until official patches are released, consider deploying compensating controls such as containerization or sandboxing of the oci-helper process to limit potential damage. Regularly check for vendor updates or community patches and apply them promptly. Additionally, educating system administrators about the risks and signs of exploitation can improve early detection and response.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Italy
CVE-2025-13875: Path Traversal in Yohann0617 oci-helper
Description
A weakness has been identified in Yohann0617 oci-helper up to 3.2.4. This issue affects the function addCfg of the file src/main/java/com/yohann/ocihelper/service/impl/OciServiceImpl.java of the component OCI Configuration Upload. Executing manipulation of the argument File can lead to path traversal. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-13875 identifies a path traversal vulnerability in the oci-helper utility developed by Yohann0617, specifically in versions 3.2.0 through 3.2.4. The vulnerability resides in the addCfg function within the OCI Configuration Upload component, implemented in the OciServiceImpl.java source file. This flaw allows an attacker to manipulate the file argument passed to the function, enabling traversal outside the intended directory structure. Such manipulation can lead to unauthorized reading or potentially overwriting of arbitrary files on the host system. The attack vector is remote, requiring no user interaction, but does require low-level privileges (PR:L) on the system. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability. Although the vendor was notified early, they have not issued any patches or advisories, and no known exploits have been observed in the wild yet. The availability of proof-of-concept exploit code increases the risk of future exploitation. This vulnerability is particularly concerning for environments that rely on oci-helper for managing OCI configurations, as it could allow attackers to access sensitive configuration files or system files, potentially leading to further compromise.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive configuration files or system data, impacting confidentiality and integrity. Organizations using oci-helper in their cloud infrastructure management or container orchestration pipelines may face risks of lateral movement or privilege escalation if attackers leverage this flaw. Although the impact on availability is low, the breach of sensitive configuration data could undermine trust and compliance with data protection regulations such as GDPR. The lack of vendor response and patches increases the window of exposure. Industries with critical cloud deployments, such as finance, healthcare, and manufacturing, could be particularly affected. The medium severity rating suggests moderate risk, but the potential for escalation or chaining with other vulnerabilities could increase the overall threat level.
Mitigation Recommendations
Immediate mitigation steps include restricting network access to the oci-helper service to trusted administrators only, implementing strict file system permissions to limit the scope of accessible files, and monitoring logs for unusual file access patterns indicative of path traversal attempts. Organizations should conduct thorough audits of systems running vulnerable versions and isolate them if possible. Employing application-layer firewalls or intrusion detection systems with custom rules to detect path traversal payloads can help detect exploitation attempts. Until official patches are released, consider deploying compensating controls such as containerization or sandboxing of the oci-helper process to limit potential damage. Regularly check for vendor updates or community patches and apply them promptly. Additionally, educating system administrators about the risks and signs of exploitation can improve early detection and response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-02T09:35:26.829Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692f01f216d939a309b5f1ea
Added to database: 12/2/2025, 3:12:50 PM
Last enriched: 12/2/2025, 3:13:25 PM
Last updated: 12/2/2025, 4:24:43 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-52059: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in RTI Connext Professional
MediumCVE-2025-65186: n/a
HighCVE-2025-65187: n/a
UnknownCVE-2025-12630: CWE-862 Missing Authorization in Upload.am
MediumCVE-2025-13877: Use of Hard-coded Cryptographic Key in nocobase
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.