Description
Vulnerability in the Oracle OCI CLI product of Oracle Open Source Projects. The supported versions that is affected is 3.77. Easily exploitable vulnerability allows unauthenticated attacker with network access to compromise Oracle OCI CLI. Successful attacks of this vulnerability can result in Oracle OCI CLI allowing users to place imported files outside the intended directory.
Published: 2026-05-06
Score: 6.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Oracle OCI CLI product version 3.77 contains a flaw that allows an unauthenticated network attacker to create or overwrite files outside the intended directory when performing import operations. This uncontrolled file placement can lead to arbitrary files being written on the host system, potentially enabling execution of malicious code or manipulation of the CLI configuration. Because the issue is not mitigated by authentication checks, any user with network access to the CLI can trigger it, resulting in a compromise of the integrity of the system.

Affected Systems

The flaw affects Oracle Corporation’s Oracle OCI CLI, part of the Oracle Open Source Projects, specifically version 3.77. No other versions are documented as impacted. Systems running this version should be considered vulnerable until updated. The CLI is typically used in cloud infrastructure management, so the risk impacts any environment where Oracle OCI CLI is installed and accessible over the network.

Risk and Exploitability

The CVSS base score of 6.1 indicates a medium severity vulnerability. The EPSS score is not available, and the flaw is not listed in CISA KEV. The attack vector is network-based, requiring no authentication. An attacker can exploit the flaw by issuing an import command with a crafted file path that resolves outside the default directory, causing the CLI to write the payload to an arbitrary location. Once the file is placed, the attacker may use it to alter configuration or execute code. Since the flaw is relatively simple to trigger and does not require special privileges, the risk to affected systems is significant, especially in environments where the CLI has elevated permissions or access to critical files.

Generated by OpenCVE AI on May 6, 2026 at 08:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Oracle OCI CLI to the latest release that addresses the directory traversal issue.
  • If an upgrade is not immediately possible, restrict network access to the OCI CLI service to trusted hosts and ensure that only authenticated users can initiate import operations.
  • Implement file system monitoring or use an ACL to detect and prevent files being written outside the intended directory.

Generated by OpenCVE AI on May 6, 2026 at 08:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 06 May 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Oracle
Oracle oci Cli
Vendors & Products Oracle
Oracle oci Cli

Wed, 06 May 2026 08:45:00 +0000

Type Values Removed Values Added
Title OCI CLI 3.77 Vulnerability Allows Unauthenticated File Placement Outside Intended Directory
Weaknesses CWE-20
CWE-22

Wed, 06 May 2026 07:30:00 +0000

Type Values Removed Values Added
Description Vulnerability in the Oracle OCI CLI product of Oracle Open Source Projects. The supported versions that is affected is 3.77. Easily exploitable vulnerability allows unauthenticated attacker with network access to compromise Oracle OCI CLI. Successful attacks of this vulnerability can result in Oracle OCI CLI allowing users to place imported files outside the intended directory.
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published:

Updated: 2026-05-06T07:08:36.667Z

Reserved: 2026-04-01T20:03:40.834Z

Link: CVE-2026-35254

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-06T08:16:03.697

Modified: 2026-05-06T08:16:03.697

Link: CVE-2026-35254

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-06T09:21:13Z

Weaknesses