This issue affects VertiGIS FM: 10.5.00119 (0d29d428).
Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A local file inclusion vulnerability in the upload/download flow of the VertiGIS FM application allows authenticated attackers to read arbitrary files from the server by manipulating a file's path during its upload. When the file is subsequently downloaded, the file in the attacker controlled path is returned. Due to the application's ASP.NET architecture, this could potentially lead to remote code execution when the "web.config" file is obtained. Furthermore, the application resolves UNC paths which may enable NTLM-relaying attacks. This issue affects VertiGIS FM: 10.5.00119 (0d29d428). | |
| Title | Local File Inclusion in the File Upload/Download Process | |
| First Time appeared |
Vertigis
Vertigis vertigis Fm |
|
| Weaknesses | CWE-610 | |
| CPEs | cpe:2.3:a:vertigis:vertigis_fm:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Vertigis
Vertigis vertigis Fm |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: NCSC.ch
Published:
Updated: 2026-04-01T13:41:23.300Z
Reserved: 2025-12-17T08:22:38.979Z
Link: CVE-2026-0522
Updated: 2026-04-01T13:41:08.971Z
Status : Awaiting Analysis
Published: 2026-04-01T14:16:26.397
Modified: 2026-04-01T14:23:37.727
Link: CVE-2026-0522
No data.
OpenCVE Enrichment
No data.