gSOAP 2.8 contains a directory traversal vulnerability that allows unauthenticated attackers to access system files by manipulating HTTP path traversal techniques. Attackers can retrieve sensitive files like /etc/passwd by sending crafted GET requests with multiple '../' directory traversal sequences.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/47653 | Exploit VDB Entry |
| https://www.genivia.com/ | Product |
| https://www.genivia.com/products.html#gsoap | Product |
| https://www.vulncheck.com/advisories/genivia-gsoap-gsoap-path-traversal | Third Party Advisory |
Configurations
History
26 Feb 2026, 22:29
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.exploit-db.com/exploits/47653 - Exploit, VDB Entry | |
| References | () https://www.genivia.com/ - Product | |
| References | () https://www.genivia.com/products.html#gsoap - Product | |
| References | () https://www.vulncheck.com/advisories/genivia-gsoap-gsoap-path-traversal - Third Party Advisory | |
| First Time |
Genivia gsoap
Genivia |
|
| CPE | cpe:2.3:a:genivia:gsoap:2.8.0:*:*:*:*:*:*:* |
18 Feb 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-18 22:16
Updated : 2026-02-26 22:29
NVD link : CVE-2019-25355
Mitre link : CVE-2019-25355
CVE.ORG link : CVE-2019-25355
JSON object : View
Products Affected
genivia
- gsoap
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
