Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26646: CWE-73: External Control of File Name or Path in Microsoft .NET 8.0

0
High
VulnerabilityCVE-2025-26646cvecve-2025-26646cwe-73
Published: Tue May 13 2025 (05/13/2025, 21:39:52 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: .NET 8.0

Description

External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:02:02 UTC

Technical Analysis

CVE-2025-26646 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting Microsoft .NET 8.0, Visual Studio, and Build Tools for Visual Studio. The issue arises when external input controls the file name or path used by the application, allowing an authorized attacker to manipulate these paths. This can lead to spoofing attacks over a network, where attackers may deceive systems or users by substituting or redirecting files or resources. The vulnerability requires the attacker to have some level of privileges (PR:L) and user interaction (UI:R), but the attack complexity is low (AC:L), meaning it is relatively straightforward to exploit once conditions are met. The flaw impacts confidentiality, integrity, and availability (all rated high), indicating that attackers could potentially access sensitive data, alter system behavior, or disrupt services. Although no public exploits have been reported yet, the vulnerability is considered critical due to the widespread use of .NET 8.0 in enterprise applications and development environments. The lack of available patches at the time of disclosure necessitates immediate attention to mitigation strategies. The vulnerability was reserved in February 2025 and published in May 2025, with enrichment from CISA indicating its recognized importance in the cybersecurity community.

Potential Impact

The potential impact of CVE-2025-26646 is significant for organizations worldwide that utilize Microsoft .NET 8.0 and related development tools. Exploitation could allow attackers to perform spoofing attacks, potentially leading to unauthorized access to sensitive information, data tampering, or disruption of critical services. This could result in data breaches, intellectual property theft, and operational downtime. Given the integration of .NET in numerous enterprise applications, the vulnerability could affect a wide range of industries including finance, healthcare, government, and technology sectors. The requirement for some privileges and user interaction limits the attack surface somewhat, but insider threats or compromised user accounts could still leverage this vulnerability effectively. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score underscores the urgency for organizations to prepare and respond promptly.

Mitigation Recommendations

Organizations should implement the following specific mitigations: 1) Monitor for updates from Microsoft and apply patches for .NET 8.0, Visual Studio, and Build Tools as soon as they become available. 2) Enforce strict input validation and sanitization on any file name or path inputs within applications to prevent unauthorized manipulation. 3) Limit privileges for users and processes interacting with file paths to the minimum necessary, reducing the risk of exploitation by authorized attackers. 4) Employ application whitelisting and integrity checks to detect and prevent unauthorized file modifications or spoofing attempts. 5) Use network segmentation and monitoring to detect anomalous activities related to file path manipulations or spoofing behavior. 6) Educate developers and system administrators about secure coding practices related to file handling and path management. 7) Implement multi-factor authentication to reduce the risk of compromised credentials being used to exploit this vulnerability. These measures, combined with timely patching, will significantly reduce the risk posed by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T19:23:29.269Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aeb942

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 2/26/2026, 9:02:02 PM

Last updated: 3/25/2026, 1:38:28 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses