CVE-2026-0522
Local File Inclusion in the File Upload/Download Process
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
A local file inclusion vulnerability in the upload/download flow of the VertiGIS FM application allows authenticated attackers to read arbitrary files from the server by manipulating a file's path during its upload. When the file is subsequently downloaded, the file in the attacker controlled path is returned. Due to the application's ASP.NET architecture, this could potentially lead to remote code execution when the "web.config" file is obtained. Furthermore, the application resolves UNC paths which may enable NTLM-relaying attacks. This issue affects VertiGIS FM: 10.5.00119 (0d29d428).
| CWE | CWE-610 |
| Vendor | vertigis |
| Product | vertigis fm |
| Published | Apr 1, 2026 |
| Last Updated | Apr 1, 2026 |
Stay Ahead of the Next One
Get instant alerts for vertigis vertigis fm
Be the first to know when new unknown vulnerabilities affecting vertigis vertigis fm are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
VertiGIS / VertiGIS FM
0 < 10.11.363
References
Credits
Benjamin Faller, Redguard AG David Wischnjak, Redguard AG