CVE-2025-59793
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with valid login credentials to upload files to any location on the server's filesystem, potentially leading to the execution of malicious code. The issue arises because the application fails to properly check the file paths, making it easy for attackers to manipulate where files are saved.
Technical Description
Rocket TRUfusion Enterprise through 7.10.5 exposes the endpoint at /axis2/services/WsPortalV6UpDwAxis2Impl to authenticated users to be able to upload files. However, the application doesn't properly sanitize the jobDirectory parameter, which allows path traversal sequences to be included. This allows writing files to arbitrary local filesystem locations and may subsequently lead to remote code execution.
Exploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 17, 2026
about 2 months ago
Last Modified
Feb 18, 2026
about 2 months ago