CVE-2025-59793
Path Traversal in Rocket TRUfusion Allows Remote Code Execution
Publication date: 2026-02-17
Last updated on: 2026-04-03
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rocketsoftware | trufusion_enterprise | to 7.10.5.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-35 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2025-59793 is a critical authenticated path traversal vulnerability in Rocket Software TRUfusion Enterprise versions prior to 7.10.5. It affects the file upload functionality of the /axis2/services/WsPortalV6UpDwAxis2Impl service. The vulnerability occurs because the application does not properly validate the jobDirectory parameter, allowing attackers to include path traversal sequences.'}, {'type': 'paragraph', 'content': "This flaw enables attackers to write files to arbitrary locations on the server's filesystem, including directories that are web-accessible or executable. This can lead to remote code execution (RCE), where an attacker can run malicious code on the affected server."}, {'type': 'paragraph', 'content': 'The risk is increased if default administrator credentials are used, and although some versions restrict the vulnerable endpoint to localhost, this can be bypassed by chaining with another vulnerability.'}] [2]
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized file writes to the server, which may allow attackers to upload malicious files such as web shells.
Successful exploitation can lead to remote code execution, giving attackers control over the affected system.
This can compromise the confidentiality, integrity, and availability of the system and its data, potentially leading to data breaches, service disruption, and further network compromise.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by monitoring for attempts to exploit the path traversal in the /axis2/services/WsPortalV6UpDwAxis2Impl endpoint, specifically targeting the jobDirectory parameter in the uploadFile operation.'}, {'type': 'paragraph', 'content': 'Detection can involve inspecting SOAP requests for unusual path traversal sequences (e.g., ../) in the jobDirectory parameter that attempt to write files outside the intended directory.'}, {'type': 'paragraph', 'content': 'Network detection commands could include using tools like tcpdump or Wireshark to capture HTTP/SOAP traffic to the vulnerable endpoint and filtering for suspicious payloads containing path traversal patterns.'}, {'type': 'list_item', 'content': "Example tcpdump command to capture traffic to the vulnerable endpoint: tcpdump -i <interface> -A 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep -i 'WsPortalV6UpDwAxis2Impl'"}, {'type': 'list_item', 'content': "Use grep or similar tools on web server logs to search for requests containing 'jobDirectory=../' or other path traversal sequences."}, {'type': 'paragraph', 'content': 'Additionally, reviewing authentication logs for suspicious access patterns to the endpoint by authenticated users may help identify exploitation attempts.'}] [2]
What immediate steps should I take to mitigate this vulnerability?
The primary immediate mitigation step is to update Rocket TRUfusion Enterprise to version 7.10.5 or later, where the vulnerability has been addressed.
If updating immediately is not possible, restrict access to the /axis2/services/WsPortalV6UpDwAxis2Impl endpoint to trusted users only and ensure strong authentication credentials are in place, avoiding default administrator credentials.
Implement network-level controls such as firewall rules to limit access to the vulnerable service, especially if the Axis2 endpoint is exposed beyond localhost.
Monitor logs for suspicious file upload attempts and path traversal patterns to detect and respond to exploitation attempts quickly.