Description

A local file inclusion vulnerability in the upload/download flow of the VertiGIS FM application allows authenticated attackers to read arbitrary files from the server by manipulating a file's path during its upload. When the file is subsequently downloaded, the file in the attacker controlled path is returned. Due to the application's ASP.NET architecture, this could potentially lead to remote code execution when the "web.config" file is obtained. Furthermore, the application resolves UNC paths which may enable NTLM-relaying attacks. This issue affects VertiGIS FM: 10.5.00119 (0d29d428).

INFO

Published Date :

2026-04-01T13:11:13.384Z

Last Modified :

2026-04-01T13:41:23.300Z

Source :

NCSC.ch
AFFECTED PRODUCTS

The following products are affected by CVE-2026-0522 vulnerability.

Vendors Products
Vertigis
  • Fm
  • Vertigis Fm
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-0522.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact