Description
TRUfusion Enterprise through 7.10.4.0 uses the /trufusionPortal/fileupload endpoint to upload files. However, the application doesn't properly sanitize the input to this endpoint, ultimately allowing path traversal sequences to be included. This can be used to write to any filename with any file type at any location on the local server, ultimately allowing execution of arbitrary code.
References (3)
Core 3
Core References
Exploit, Third Party Advisory
https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2025-27224.txt
Exploit, Third Party Advisory
https://www.rcesecurity.com/2025/09/when-audits-fail-four-critical-pre-auth-vulnerabilities-in-trufusion-enterprise/
Scores
CVSS v3
9.8
EPSS
0.0024
EPSS Percentile
47.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
yes
Technical Impact
total
Details
CWE
CWE-20
Status
published
Products (1)
rocketsoftware/trufusion_enterprise
< 7.10.4.0
Published
Oct 27, 2025
Tracked Since
Feb 18, 2026