A local file inclusion vulnerability in the upload/download flow of the VertiGIS FM application allows authenticated attackers to read arbitrary files from the server by manipulating a file's path during its upload. When the file is subsequently downloaded, the file in the attacker controlled path is returned. Due to the application's ASP.NET architecture, this could potentially lead to remote code execution when the "web.config" file is obtained. Furthermore, the application resolves UNC paths which may enable NTLM-relaying attacks.
This issue affects VertiGIS FM: 10.5.00119 (0d29d428).
References
| Link | Resource |
|---|---|
| https://support.vertigis.com/hc/en-us/articles/31214433137042-Security-Vulnerability-VertiGIS-FM | Vendor Advisory |
| https://www.redguard.ch/blog/2026/04/01/advisory-vertigis-vertigisfm/ | Third Party Advisory Exploit |
Configurations
History
07 Apr 2026, 20:36
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://support.vertigis.com/hc/en-us/articles/31214433137042-Security-Vulnerability-VertiGIS-FM - Vendor Advisory | |
| References | () https://www.redguard.ch/blog/2026/04/01/advisory-vertigis-vertigisfm/ - Third Party Advisory, Exploit | |
| CPE | cpe:2.3:a:vertigis:fm:10.11.363:*:*:*:*:*:*:* | |
| First Time |
Vertigis fm
Vertigis |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
01 Apr 2026, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-01 14:16
Updated : 2026-04-07 20:36
NVD link : CVE-2026-0522
Mitre link : CVE-2026-0522
CVE.ORG link : CVE-2026-0522
JSON object : View
Products Affected
vertigis
- fm
CWE
CWE-610
Externally Controlled Reference to a Resource in Another Sphere
