CVE-2026-0522

A local file inclusion vulnerability in the upload/download flow of the VertiGIS FM application allows authenticated attackers to read arbitrary files from the server by manipulating a file's path during its upload. When the file is subsequently downloaded, the file in the attacker controlled path is returned. Due to the application's ASP.NET architecture, this could potentially lead to remote code execution when the "web.config" file is obtained. Furthermore, the application resolves UNC paths which may enable NTLM-relaying attacks. This issue affects VertiGIS FM: 10.5.00119 (0d29d428).
Configurations

Configuration 1 (hide)

cpe:2.3:a:vertigis:fm:10.11.363:*:*:*:*:*:*:*

History

07 Apr 2026, 20:36

Type Values Removed Values Added
References () https://support.vertigis.com/hc/en-us/articles/31214433137042-Security-Vulnerability-VertiGIS-FM - () https://support.vertigis.com/hc/en-us/articles/31214433137042-Security-Vulnerability-VertiGIS-FM - Vendor Advisory
References () https://www.redguard.ch/blog/2026/04/01/advisory-vertigis-vertigisfm/ - () https://www.redguard.ch/blog/2026/04/01/advisory-vertigis-vertigisfm/ - Third Party Advisory, Exploit
CPE cpe:2.3:a:vertigis:fm:10.11.363:*:*:*:*:*:*:*
First Time Vertigis fm
Vertigis
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

01 Apr 2026, 14:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-01 14:16

Updated : 2026-04-07 20:36


NVD link : CVE-2026-0522

Mitre link : CVE-2026-0522

CVE.ORG link : CVE-2026-0522


JSON object : View

Products Affected

vertigis

  • fm
CWE
CWE-610

Externally Controlled Reference to a Resource in Another Sphere