CVE-2019-25355

gSOAP 2.8 contains a directory traversal vulnerability that allows unauthenticated attackers to access system files by manipulating HTTP path traversal techniques. Attackers can retrieve sensitive files like /etc/passwd by sending crafted GET requests with multiple '../' directory traversal sequences.
Configurations

Configuration 1 (hide)

cpe:2.3:a:genivia:gsoap:2.8.0:*:*:*:*:*:*:*

History

26 Feb 2026, 22:29

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/47653 - () https://www.exploit-db.com/exploits/47653 - Exploit, VDB Entry
References () https://www.genivia.com/ - () https://www.genivia.com/ - Product
References () https://www.genivia.com/products.html#gsoap - () https://www.genivia.com/products.html#gsoap - Product
References () https://www.vulncheck.com/advisories/genivia-gsoap-gsoap-path-traversal - () https://www.vulncheck.com/advisories/genivia-gsoap-gsoap-path-traversal - Third Party Advisory
First Time Genivia gsoap
Genivia
CPE cpe:2.3:a:genivia:gsoap:2.8.0:*:*:*:*:*:*:*

18 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-18 22:16

Updated : 2026-02-26 22:29


NVD link : CVE-2019-25355

Mitre link : CVE-2019-25355

CVE.ORG link : CVE-2019-25355


JSON object : View

Products Affected

genivia

  • gsoap
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')