CVE-2025-27222

TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/getCobrandingData endpoint to retrieve files. However, the application doesn't properly sanitize the input to this endpoint, ultimately allowing path traversal sequences to be included. This can be used to read any local server file that is accessible by the TRUfusion user and can also be used to leak cleartext passwords of TRUfusion Enterprise itself.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rocketsoftware:trufusion_enterprise:*:*:*:*:*:*:*:*

History

03 Nov 2025, 16:57

Type Values Removed Values Added
CPE cpe:2.3:a:rocketsoftware:trufusion_enterprise:*:*:*:*:*:*:*:*
References () https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-27222.txt - () https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-27222.txt - Exploit, Third Party Advisory
References () https://www.rcesecurity.com/2025/09/when-audits-fail-four-critical-pre-auth-vulnerabilities-in-trufusion-enterprise/ - () https://www.rcesecurity.com/2025/09/when-audits-fail-four-critical-pre-auth-vulnerabilities-in-trufusion-enterprise/ - Exploit, Third Party Advisory
References () https://www.rocketsoftware.com/products/rocket-b2b-supply-chain-integration/rocket-trufusion-enterprise - () https://www.rocketsoftware.com/products/rocket-b2b-supply-chain-integration/rocket-trufusion-enterprise - Product
First Time Rocketsoftware
Rocketsoftware trufusion Enterprise

27 Oct 2025, 21:15

Type Values Removed Values Added
CWE CWE-35
CWE-22
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.6

27 Oct 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-27 17:15

Updated : 2025-11-03 16:57


NVD link : CVE-2025-27222

Mitre link : CVE-2025-27222

CVE.ORG link : CVE-2025-27222


JSON object : View

Products Affected

rocketsoftware

  • trufusion_enterprise
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-35

Path Traversal: '.../...//'