Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59793: n/a

0
Unknown
VulnerabilityCVE-2025-59793cvecve-2025-59793
Published: Tue Feb 17 2026 (02/17/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

Rocket TRUfusion Enterprise through 7.10.5 exposes the endpoint at /axis2/services/WsPortalV6UpDwAxis2Impl to authenticated users to be able to upload files. However, the application doesn't properly sanitize the jobDirectory parameter, which allows path traversal sequences to be included. This allows writing files to arbitrary local filesystem locations and may subsequently lead to remote code execution.

AI-Powered Analysis

AILast updated: 02/18/2026, 08:23:28 UTC

Technical Analysis

CVE-2025-59793 is a security vulnerability identified in Rocket TRUfusion Enterprise versions through 7.10.5. The vulnerability exists in the web service endpoint /axis2/services/WsPortalV6UpDwAxis2Impl, which allows authenticated users to upload files. The core issue is the lack of proper sanitization of the jobDirectory parameter, which accepts path traversal sequences (e.g., ../) that enable attackers to write files outside the intended directory. This arbitrary file write capability can be leveraged to place malicious files anywhere on the local filesystem, including locations that may be executed by the system or other services, potentially leading to remote code execution (RCE). The vulnerability requires authentication, which limits exposure to some extent but still represents a critical risk in environments where user credentials can be compromised or where many users have access. No CVSS score has been assigned yet, and no known exploits have been reported in the wild. However, the vulnerability's characteristics indicate a high risk due to the ability to execute arbitrary code remotely, which can compromise system confidentiality, integrity, and availability. The vulnerability affects enterprise environments using Rocket TRUfusion, a platform often used in document management and workflow automation, which may be integrated into critical business processes. The absence of patches or mitigation guidance from the vendor at the time of publication necessitates immediate defensive measures to reduce risk.

Potential Impact

For European organizations, this vulnerability could have severe consequences. Exploitation can lead to unauthorized file writes and remote code execution, potentially allowing attackers to take full control of affected systems. This can result in data breaches, disruption of business operations, and compromise of sensitive information. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on Rocket TRUfusion Enterprise for document processing and workflow automation are particularly at risk. The ability to execute arbitrary code could enable lateral movement within networks, data exfiltration, or deployment of ransomware. The requirement for authentication reduces the attack surface but does not eliminate the risk, especially in environments with weak credential management or insider threats. The lack of a patch increases the urgency for organizations to implement compensating controls to prevent exploitation.

Mitigation Recommendations

1. Immediately restrict access to the /axis2/services/WsPortalV6UpDwAxis2Impl endpoint to only trusted and necessary users, ideally limiting it via network segmentation or firewall rules. 2. Enforce strong authentication and monitor user accounts for suspicious activity to reduce the risk of credential compromise. 3. Implement strict input validation and sanitization at the application or web server level, if possible, to block path traversal sequences in the jobDirectory parameter. 4. Monitor file system activity for unexpected writes outside of normal directories, using file integrity monitoring tools. 5. Deploy application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting this endpoint. 6. Engage with the vendor for patches or official mitigation guidance and apply updates as soon as they become available. 7. Conduct regular security audits and penetration tests focusing on authenticated user privileges and file upload functionalities. 8. Educate users with access about the risks and encourage reporting of unusual system behavior.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699575bd80d747be205377e4

Added to database: 2/18/2026, 8:18:05 AM

Last enriched: 2/18/2026, 8:23:28 AM

Last updated: 2/21/2026, 12:16:42 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats