CVE-2025-59793
Received Received - Intake
Path Traversal in Rocket TRUfusion Allows Remote Code Execution

Publication date: 2026-02-17

Last updated on: 2026-04-03

Assigner: MITRE

Description
Rocket TRUfusion Enterprise through 7.10.5 exposes the endpoint at /axis2/services/WsPortalV6UpDwAxis2Impl to authenticated users to be able to upload files. However, the application doesn't properly sanitize the jobDirectory parameter, which allows path traversal sequences to be included. This allows writing files to arbitrary local filesystem locations and may subsequently lead to remote code execution.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-17
Last Modified
2026-04-03
Generated
2026-05-07
AI Q&A
2026-02-17
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
rocketsoftware trufusion_enterprise to 7.10.5.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-35 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2025-59793 is a critical authenticated path traversal vulnerability in Rocket Software TRUfusion Enterprise versions prior to 7.10.5. It affects the file upload functionality of the /axis2/services/WsPortalV6UpDwAxis2Impl service. The vulnerability occurs because the application does not properly validate the jobDirectory parameter, allowing attackers to include path traversal sequences.'}, {'type': 'paragraph', 'content': "This flaw enables attackers to write files to arbitrary locations on the server's filesystem, including directories that are web-accessible or executable. This can lead to remote code execution (RCE), where an attacker can run malicious code on the affected server."}, {'type': 'paragraph', 'content': 'The risk is increased if default administrator credentials are used, and although some versions restrict the vulnerable endpoint to localhost, this can be bypassed by chaining with another vulnerability.'}] [2]


How can this vulnerability impact me? :

This vulnerability can have severe impacts including unauthorized file writes to the server, which may allow attackers to upload malicious files such as web shells.

Successful exploitation can lead to remote code execution, giving attackers control over the affected system.

This can compromise the confidentiality, integrity, and availability of the system and its data, potentially leading to data breaches, service disruption, and further network compromise.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for attempts to exploit the path traversal in the /axis2/services/WsPortalV6UpDwAxis2Impl endpoint, specifically targeting the jobDirectory parameter in the uploadFile operation.'}, {'type': 'paragraph', 'content': 'Detection can involve inspecting SOAP requests for unusual path traversal sequences (e.g., ../) in the jobDirectory parameter that attempt to write files outside the intended directory.'}, {'type': 'paragraph', 'content': 'Network detection commands could include using tools like tcpdump or Wireshark to capture HTTP/SOAP traffic to the vulnerable endpoint and filtering for suspicious payloads containing path traversal patterns.'}, {'type': 'list_item', 'content': "Example tcpdump command to capture traffic to the vulnerable endpoint: tcpdump -i <interface> -A 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep -i 'WsPortalV6UpDwAxis2Impl'"}, {'type': 'list_item', 'content': "Use grep or similar tools on web server logs to search for requests containing 'jobDirectory=../' or other path traversal sequences."}, {'type': 'paragraph', 'content': 'Additionally, reviewing authentication logs for suspicious access patterns to the endpoint by authenticated users may help identify exploitation attempts.'}] [2]


What immediate steps should I take to mitigate this vulnerability?

The primary immediate mitigation step is to update Rocket TRUfusion Enterprise to version 7.10.5 or later, where the vulnerability has been addressed.

If updating immediately is not possible, restrict access to the /axis2/services/WsPortalV6UpDwAxis2Impl endpoint to trusted users only and ensure strong authentication credentials are in place, avoiding default administrator credentials.

Implement network-level controls such as firewall rules to limit access to the vulnerable service, especially if the Axis2 endpoint is exposed beyond localhost.

Monitor logs for suspicious file upload attempts and path traversal patterns to detect and respond to exploitation attempts quickly.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart