CVE-2026-0522
Published: 01 April 2026
Description
A local file inclusion vulnerability in the upload/download flow of the VertiGIS FM application allows authenticated attackers to read arbitrary files from the server by manipulating a file's path during its upload. When the file is subsequently downloaded, the file…
more
in the attacker controlled path is returned. Due to the application's ASP.NET architecture, this could potentially lead to remote code execution when the "web.config" file is obtained. Furthermore, the application resolves UNC paths which may enable NTLM-relaying attacks. This issue affects VertiGIS FM: 10.5.00119 (0d29d428).
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the local file inclusion vulnerability by requiring validation of manipulated file path inputs during upload and download flows.
Remediates the specific flaw in VertiGIS FM version 10.5.00119 upload/download mechanism to prevent arbitrary file reads.
Enforces access controls to block unauthorized reads from attacker-controlled paths, including web.config and UNC paths.
Security SummaryAI
CVE-2026-0522 is a local file inclusion vulnerability (CWE-610) in the upload/download flow of the VertiGIS FM application, specifically affecting version 10.5.00119 (0d29d428). Authenticated attackers can manipulate a file's path during upload, causing the application to store or reference arbitrary server files. When the manipulated file is subsequently downloaded, the contents of the attacker-controlled path are returned instead.
Attackers require low privileges (PR:L) and network access (AV:N) with low complexity (AC:L) to exploit this issue, earning a CVSS v3.1 base score of 8.8 (C:H/I:H/A:H). Successful exploitation enables reading of arbitrary files, and due to the ASP.NET architecture, obtaining the web.config file could facilitate remote code execution. Additionally, the application's handling of UNC paths may allow NTLM-relaying attacks.
Advisories from VertiGIS and Redguard Security provide further details on mitigation: https://support.vertigis.com/hc/en-us/articles/31214433137042-Security-Vulnerability-VertiGIS-FM and https://www.redguard.ch/blog/2026/04/01/advisory-vertigisfm/.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
T1190: Direct exploitation of public-facing web application vulnerability. T1005: Enables arbitrary file reads from the local system. T1557.001: UNC path handling facilitates NTLM-relay attacks.