CVE-2026-0522: CWE-610 Externally Controlled Reference to a Resource in Another Sphere in VertiGIS VertiGIS FM
A local file inclusion vulnerability in the upload/download flow of the VertiGIS FM application allows authenticated attackers to read arbitrary files from the server by manipulating a file's path during its upload. When the file is subsequently downloaded, the file in the attacker controlled path is returned. Due to the application's ASP.NET architecture, this could potentially lead to remote code execution when the "web.config" file is obtained. Furthermore, the application resolves UNC paths which may enable NTLM-relaying attacks. This issue affects VertiGIS FM: 10.5.00119 (0d29d428).
AI Analysis
Technical Summary
CVE-2026-0522 is a local file inclusion (LFI) vulnerability classified under CWE-610, affecting VertiGIS FM version 10.5.00119. The vulnerability arises from insecure handling of file paths during the upload and download processes. Authenticated attackers can manipulate the file path parameter during upload to reference arbitrary files on the server. When these files are subsequently downloaded, the server returns the contents of the attacker-controlled path, enabling unauthorized file disclosure. Given VertiGIS FM’s ASP.NET architecture, obtaining sensitive files such as the web.config could allow attackers to execute remote code on the server, escalating the impact from information disclosure to full system compromise. Additionally, the application resolves UNC (Universal Naming Convention) paths, which can be abused to perform NTLM relay attacks, potentially allowing attackers to impersonate users or escalate privileges within the network. The vulnerability requires only low complexity to exploit, no user interaction, and only authenticated access, making it a significant risk for organizations relying on this software. Although no public exploits have been reported yet, the potential impact and ease of exploitation warrant immediate attention.
Potential Impact
The vulnerability can lead to severe consequences including unauthorized disclosure of sensitive files, such as configuration files containing credentials or secrets, and potentially remote code execution on affected servers. This compromises confidentiality, integrity, and availability of the affected systems. Attackers could leverage this to gain persistent access, move laterally within networks, or disrupt services. The NTLM relay attack vector further increases risk by enabling credential theft and privilege escalation within Windows environments. Organizations using VertiGIS FM in critical infrastructure, utilities, or government sectors could face operational disruptions, data breaches, and reputational damage. The requirement for only authenticated access lowers the barrier for exploitation, especially if credentials are weak or compromised.
Mitigation Recommendations
Organizations should immediately verify if they are running VertiGIS FM version 10.5.00119 and prioritize applying any available patches or updates from VertiGIS addressing CVE-2026-0522. In the absence of patches, restrict access to the upload and download functionalities to trusted users only and implement strict input validation and sanitization on file path parameters to prevent path traversal and LFI attacks. Disable or restrict UNC path resolution in the application configuration to mitigate NTLM relay risks. Employ network segmentation and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Monitor logs for unusual file access patterns or attempts to access sensitive files like web.config. Conduct regular security assessments and penetration testing focused on file upload/download features. Finally, educate users about the risks of credential sharing and phishing to reduce the likelihood of attacker authentication.
Affected Countries
United States, Canada, United Kingdom, Germany, Australia, Netherlands, France, Sweden, Japan, South Korea
CVE-2026-0522: CWE-610 Externally Controlled Reference to a Resource in Another Sphere in VertiGIS VertiGIS FM
Description
A local file inclusion vulnerability in the upload/download flow of the VertiGIS FM application allows authenticated attackers to read arbitrary files from the server by manipulating a file's path during its upload. When the file is subsequently downloaded, the file in the attacker controlled path is returned. Due to the application's ASP.NET architecture, this could potentially lead to remote code execution when the "web.config" file is obtained. Furthermore, the application resolves UNC paths which may enable NTLM-relaying attacks. This issue affects VertiGIS FM: 10.5.00119 (0d29d428).
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-0522 is a local file inclusion (LFI) vulnerability classified under CWE-610, affecting VertiGIS FM version 10.5.00119. The vulnerability arises from insecure handling of file paths during the upload and download processes. Authenticated attackers can manipulate the file path parameter during upload to reference arbitrary files on the server. When these files are subsequently downloaded, the server returns the contents of the attacker-controlled path, enabling unauthorized file disclosure. Given VertiGIS FM’s ASP.NET architecture, obtaining sensitive files such as the web.config could allow attackers to execute remote code on the server, escalating the impact from information disclosure to full system compromise. Additionally, the application resolves UNC (Universal Naming Convention) paths, which can be abused to perform NTLM relay attacks, potentially allowing attackers to impersonate users or escalate privileges within the network. The vulnerability requires only low complexity to exploit, no user interaction, and only authenticated access, making it a significant risk for organizations relying on this software. Although no public exploits have been reported yet, the potential impact and ease of exploitation warrant immediate attention.
Potential Impact
The vulnerability can lead to severe consequences including unauthorized disclosure of sensitive files, such as configuration files containing credentials or secrets, and potentially remote code execution on affected servers. This compromises confidentiality, integrity, and availability of the affected systems. Attackers could leverage this to gain persistent access, move laterally within networks, or disrupt services. The NTLM relay attack vector further increases risk by enabling credential theft and privilege escalation within Windows environments. Organizations using VertiGIS FM in critical infrastructure, utilities, or government sectors could face operational disruptions, data breaches, and reputational damage. The requirement for only authenticated access lowers the barrier for exploitation, especially if credentials are weak or compromised.
Mitigation Recommendations
Organizations should immediately verify if they are running VertiGIS FM version 10.5.00119 and prioritize applying any available patches or updates from VertiGIS addressing CVE-2026-0522. In the absence of patches, restrict access to the upload and download functionalities to trusted users only and implement strict input validation and sanitization on file path parameters to prevent path traversal and LFI attacks. Disable or restrict UNC path resolution in the application configuration to mitigate NTLM relay risks. Employ network segmentation and enforce strong authentication mechanisms, including multi-factor authentication, to reduce the risk of credential compromise. Monitor logs for unusual file access patterns or attempts to access sensitive files like web.config. Conduct regular security assessments and penetration testing focused on file upload/download features. Finally, educate users about the risks of credential sharing and phishing to reduce the likelihood of attacker authentication.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- NCSC.ch
- Date Reserved
- 2025-12-17T08:22:38.979Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69cd1fdee6bfc5ba1dd19c06
Added to database: 4/1/2026, 1:38:38 PM
Last enriched: 4/1/2026, 1:54:18 PM
Last updated: 4/5/2026, 1:36:38 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.