CVE-2025-13875
Description
A weakness has been identified in Yohann0617 oci-helper up to 3.2.4. This issue affects the function addCfg of the file src/main/java/com/yohann/ocihelper/service/impl/OciServiceImpl.java of the component OCI Configuration Upload. Executing manipulation of the argument File can lead to path traversal. It is possible to launch the attack remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A path traversal vulnerability in oci-helper up to 3.2.4 allows authenticated remote attackers to write arbitrary files via unsanitized filename input during OCI configuration upload.
Root
Cause
The path traversal vulnerability resides in the addCfg function of OciServiceImpl.java (line 146). The application constructs a file path by directly concatenating the user-supplied filename (params.getFile().getOriginalFilename()) with the base directory, without any sanitization or validation. The FileUtil.touch() method, which is from the Hutool library, then creates the file at the attacker-controlled path, enabling directory traversal [1][2].
Exploitation
An authenticated attacker can launch a remote exploit by sending a crafted multipart request to the /api/oci/addCfg endpoint. The attacker controls the filename (e.g., using ../ sequences) to write files to arbitrary locations on the server. No special network position is required as the attack is fully remote [1]. Public exploit code has been made available [2].
Impact
Successful exploitation allows arbitrary file write. This could lead to overwriting application files, configuration files, or other sensitive data, potentially resulting in full compromise of the application. The CVSS v3.1 score from the reference is 8.1 (High) due to high impact on confidentiality and integrity [1].
Mitigation
As of the disclosure date (2025-11-10), the vendor had not responded and no fix was available [1]. Users should apply input validation on the filename, restrict upload destinations, or disable the affected functionality until a patch is released.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<=3.2.4+ 1 more
- (no CPE)range: <=3.2.4
- (no CPE)range: <=3.2.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5News mentions
0No linked articles in our index yet.