CVE-2025-59793

None
|0.0
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with valid login credentials to upload files to any location on the server's filesystem, potentially leading to the execution of malicious code. The issue arises because the application fails to properly check the file paths, making it easy for attackers to manipulate where files are saved.

Technical Description

Rocket TRUfusion Enterprise through 7.10.5 exposes the endpoint at /axis2/services/WsPortalV6UpDwAxis2Impl to authenticated users to be able to upload files. However, the application doesn't properly sanitize the jobDirectory parameter, which allows path traversal sequences to be included. This allows writing files to arbitrary local filesystem locations and may subsequently lead to remote code execution.

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$0($0-$100)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Feb 17, 2026

about 2 months ago

Last Modified

Feb 18, 2026

about 2 months ago