Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
8.7

gSOAP 2.8: Unauthenticated File Access via Malicious HTTP Requests

CVE-2019-25355
Summary

An attacker can access sensitive system files by sending a specially crafted HTTP request. This can happen if you're using gSOAP 2.8 and haven't taken steps to prevent it. To protect your system, update to a fixed version of gSOAP or apply the recommended security patches.

What to do

No fix is available yet. Check with your software vendor for updates.

Affected software
VendorProductAffected versionsFix available
genivia gsoap 2.8.0 –
Original title
gSOAP 2.8 contains a directory traversal vulnerability that allows unauthenticated attackers to access system files by manipulating HTTP path traversal techniques. Attackers can retrieve sensitive ...
Original description
gSOAP 2.8 contains a directory traversal vulnerability that allows unauthenticated attackers to access system files by manipulating HTTP path traversal techniques. Attackers can retrieve sensitive files like /etc/passwd by sending crafted GET requests with multiple '../' directory traversal sequences.
nvd CVSS3.1 7.5
nvd CVSS4.0 8.7
Vulnerability type
CWE-22 Path Traversal
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026