TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/getCobrandingData endpoint to retrieve files. However, the application doesn't properly sanitize the input to this endpoint, ultimately allowing path traversal sequences to be included. This can be used to read any local server file that is accessible by the TRUfusion user and can also be used to leak cleartext passwords of TRUfusion Enterprise itself.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 27 Oct 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Rocketsoftware
Rocketsoftware trufusion Enterprise
Vendors & Products Rocketsoftware
Rocketsoftware trufusion Enterprise

Mon, 27 Oct 2025 21:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-22
CWE-35
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Oct 2025 16:30:00 +0000

Type Values Removed Values Added
Description TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/getCobrandingData endpoint to retrieve files. However, the application doesn't properly sanitize the input to this endpoint, ultimately allowing path traversal sequences to be included. This can be used to read any local server file that is accessible by the TRUfusion user and can also be used to leak cleartext passwords of TRUfusion Enterprise itself.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-10-27T20:24:10.653Z

Reserved: 2025-02-20T00:00:00.000Z

Link: CVE-2025-27222

cve-icon Vulnrichment

Updated: 2025-10-27T20:22:18.443Z

cve-icon NVD

Status : Received

Published: 2025-10-27T17:15:37.853

Modified: 2025-10-27T21:15:36.910

Link: CVE-2025-27222

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-27T22:09:52Z