Description
TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/getCobrandingData endpoint to retrieve files. However, the application doesn't properly sanitize the input to this endpoint, ultimately allowing path traversal sequences to be included. This can be used to read any local server file that is accessible by the TRUfusion user and can also be used to leak cleartext passwords of TRUfusion Enterprise itself.
INFO
Published Date :
2025-10-27T00:00:00.000Z
Last Modified :
2025-10-27T20:24:10.653Z
Source :
mitre
AFFECTED PRODUCTS
The following products are affected by CVE-2025-27222 vulnerability.
| Vendors | Products |
|---|---|
| Rocketsoftware |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-27222.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact