Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0522: CWE-610 Externally Controlled Reference to a Resource in Another Sphere in VertiGIS VertiGIS FM

0
High
VulnerabilityCVE-2026-0522cvecve-2026-0522cwe-610
Published: Wed Apr 01 2026 (04/01/2026, 13:11:13 UTC)
Source: CVE Database V5
Vendor/Project: VertiGIS
Product: VertiGIS FM

Description

A local file inclusion vulnerability in the upload/download flow of the VertiGIS FM application allows authenticated attackers to read arbitrary files from the server by manipulating a file's path during its upload. When the file is subsequently downloaded, the file in the attacker controlled path is returned. Due to the application's ASP.NET architecture, this could potentially lead to remote code execution when the "web.config" file is obtained. Furthermore, the application resolves UNC paths which may enable NTLM-relaying attacks. This issue affects VertiGIS FM: 10.5.00119 (0d29d428).

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 13:54:18 UTC

Technical Analysis

CVE-2026-0522 is a local file inclusion (LFI) vulnerability classified under CWE-610, affecting VertiGIS FM version 10.5.00119. The vulnerability arises from insecure handling of file paths during the upload and download processes. Authenticated attackers can manipulate the file path parameter during upload to reference arbitrary files on the server. When these files are subsequently downloaded, the server returns the contents of the attacker-controlled path, enabling unauthorized file disclosure. Given VertiGIS FM’s ASP.NET architecture, obtaining sensitive files such as the web.config could allow attackers to execute remote code on the server, escalating the impact from information disclosure to full system compromise. Additionally, the application resolves UNC (Universal Naming Convention) paths, which can be abused to perform NTLM relay attacks, potentially allowing attackers to impersonate users or escalate privileges within the network. The vulnerability requires only low complexity to exploit, no user interaction, and only authenticated access, making it a significant risk for organizations relying on this software. Although no public exploits have been reported yet, the potential impact and ease of exploitation warrant immediate attention.

Potential Impact

The vulnerability can lead to severe consequences including unauthorized disclosure of sensitive files, such as configuration files containing credentials or secrets, and potentially remote code execution on affected servers. This compromises confidentiality, integrity, and availability of the affected systems. Attackers could leverage this to gain persistent access, move laterally within networks, or disrupt services. The NTLM relay attack vector further increases risk by enabling credential theft and privilege escalation within Windows environments. Organizations using VertiGIS FM in critical infrastructure, utilities, or government sectors could face operational disruptions, data breaches, and reputational damage. The requirement for only authenticated access lowers the barrier for exploitation, especially if credentials are weak or compromised.

Mitigation Recommendations

Organizations should immediately verify if they are running VertiGIS FM version 10.5.00119 and prioritize applying any available patches or updates from VertiGIS addressing CVE-2026-0522. In the absence of patches, restrict access to the upload and download functionalities to trusted users only and implement strict input validation and sanitization on file path parameters to prevent path traversal and LFI attacks. Disable or restrict UNC path resolution in the application configuration to mitigate NTLM relay risks. Employ network segmentation and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Monitor logs for unusual file access patterns or attempts to access sensitive files like web.config. Conduct regular security assessments and penetration testing focused on file upload/download features. Finally, educate users about the risks of credential sharing and phishing to reduce the likelihood of attacker authentication.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
NCSC.ch
Date Reserved
2025-12-17T08:22:38.979Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cd1fdee6bfc5ba1dd19c06

Added to database: 4/1/2026, 1:38:38 PM

Last enriched: 4/1/2026, 1:54:18 PM

Last updated: 4/5/2026, 1:36:38 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses