A local file inclusion vulnerability in the upload/download flow of the VertiGIS FM application allows authenticated attackers to read arbitrary files from the server by manipulating a file's path during its upload. When the file is subsequently downloaded, the file in the attacker controlled path is returned. Due to the application's ASP.NET architecture, this could potentially lead to remote code execution when the "web.config" file is obtained. Furthermore, the application resolves UNC paths which may enable NTLM-relaying attacks.







This issue affects VertiGIS FM: 10.5.00119 (0d29d428).

Project Subscriptions

Vendors Products
Vertigis Subscribe
Vertigis Fm Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description A local file inclusion vulnerability in the upload/download flow of the VertiGIS FM application allows authenticated attackers to read arbitrary files from the server by manipulating a file's path during its upload. When the file is subsequently downloaded, the file in the attacker controlled path is returned. Due to the application's ASP.NET architecture, this could potentially lead to remote code execution when the "web.config" file is obtained. Furthermore, the application resolves UNC paths which may enable NTLM-relaying attacks. This issue affects VertiGIS FM: 10.5.00119 (0d29d428).
Title Local File Inclusion in the File Upload/Download Process
First Time appeared Vertigis
Vertigis vertigis Fm
Weaknesses CWE-610
CPEs cpe:2.3:a:vertigis:vertigis_fm:*:*:*:*:*:*:*:*
Vendors & Products Vertigis
Vertigis vertigis Fm
References
Metrics cvssV4_0

{'score': 7.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/E:P'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: NCSC.ch

Published:

Updated: 2026-04-01T13:41:23.300Z

Reserved: 2025-12-17T08:22:38.979Z

Link: CVE-2026-0522

cve-icon Vulnrichment

Updated: 2026-04-01T13:41:08.971Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-01T14:16:26.397

Modified: 2026-04-01T14:23:37.727

Link: CVE-2026-0522

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:17:38Z

Weaknesses