Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13875: Path Traversal in Yohann0617 oci-helper

0
Medium
VulnerabilityCVE-2025-13875cvecve-2025-13875
Published: Tue Dec 02 2025 (12/02/2025, 15:02:05 UTC)
Source: CVE Database V5
Vendor/Project: Yohann0617
Product: oci-helper

Description

A weakness has been identified in Yohann0617 oci-helper up to 3.2.4. This issue affects the function addCfg of the file src/main/java/com/yohann/ocihelper/service/impl/OciServiceImpl.java of the component OCI Configuration Upload. Executing manipulation of the argument File can lead to path traversal. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/02/2025, 15:13:25 UTC

Technical Analysis

CVE-2025-13875 identifies a path traversal vulnerability in the oci-helper utility developed by Yohann0617, specifically in versions 3.2.0 through 3.2.4. The vulnerability resides in the addCfg function within the OCI Configuration Upload component, implemented in the OciServiceImpl.java source file. This flaw allows an attacker to manipulate the file argument passed to the function, enabling traversal outside the intended directory structure. Such manipulation can lead to unauthorized reading or potentially overwriting of arbitrary files on the host system. The attack vector is remote, requiring no user interaction, but does require low-level privileges (PR:L) on the system. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and low impact on confidentiality, integrity, and availability. Although the vendor was notified early, they have not issued any patches or advisories, and no known exploits have been observed in the wild yet. The availability of proof-of-concept exploit code increases the risk of future exploitation. This vulnerability is particularly concerning for environments that rely on oci-helper for managing OCI configurations, as it could allow attackers to access sensitive configuration files or system files, potentially leading to further compromise.

Potential Impact

For European organizations, exploitation of this vulnerability could lead to unauthorized disclosure of sensitive configuration files or system data, impacting confidentiality and integrity. Organizations using oci-helper in their cloud infrastructure management or container orchestration pipelines may face risks of lateral movement or privilege escalation if attackers leverage this flaw. Although the impact on availability is low, the breach of sensitive configuration data could undermine trust and compliance with data protection regulations such as GDPR. The lack of vendor response and patches increases the window of exposure. Industries with critical cloud deployments, such as finance, healthcare, and manufacturing, could be particularly affected. The medium severity rating suggests moderate risk, but the potential for escalation or chaining with other vulnerabilities could increase the overall threat level.

Mitigation Recommendations

Immediate mitigation steps include restricting network access to the oci-helper service to trusted administrators only, implementing strict file system permissions to limit the scope of accessible files, and monitoring logs for unusual file access patterns indicative of path traversal attempts. Organizations should conduct thorough audits of systems running vulnerable versions and isolate them if possible. Employing application-layer firewalls or intrusion detection systems with custom rules to detect path traversal payloads can help detect exploitation attempts. Until official patches are released, consider deploying compensating controls such as containerization or sandboxing of the oci-helper process to limit potential damage. Regularly check for vendor updates or community patches and apply them promptly. Additionally, educating system administrators about the risks and signs of exploitation can improve early detection and response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-02T09:35:26.829Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692f01f216d939a309b5f1ea

Added to database: 12/2/2025, 3:12:50 PM

Last enriched: 12/2/2025, 3:13:25 PM

Last updated: 12/2/2025, 4:24:43 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats