VertiGIS FM Critical Vulnerability - Remote Code Execution and XSS
Summary
CERT-Bund issued security advisory WID-SEC-2026-0959 disclosing critical vulnerabilities in VertiGIS FM building management software. The vulnerabilities carry a CVSS Base Score of 9.9 (critical) and CVSS Temporal Score of 8.9 (high), enabling remote authenticated attackers to execute arbitrary code and conduct cross-site scripting attacks. Affected versions are VertiGIS FM prior to 10.11.363 and 10.13.403.
What changed
CERT-Bund published security advisory WID-SEC-2026-0959 identifying multiple critical vulnerabilities in VertiGIS FM software versions below 10.11.363 and 10.13.403. The vulnerabilities have a CVSS Base Score of 9.9 (critical) and CVSS Temporal Score of 8.9 (high). Remote attackers who are authenticated can exploit these flaws to execute arbitrary code and perform cross-site scripting attacks.
Organizations using VertiGIS FM must immediately identify instances running affected versions and apply available patches or mitigations. Users should verify their systems are updated to version 10.11.363 or 10.13.403 and later. Given the critical severity and remote attack vector, priority patching is required to prevent potential compromise of building management systems.
What to do next
- Identify VertiGIS FM installations and verify current version numbers
- Update VertiGIS FM to version 10.11.363 or later (or 10.13.403 if using newer branch)
- Review system access controls and ensure authentication mechanisms are secured
Source document (simplified)
[WID-SEC-2026-0959] VertiGIS FM: Mehrere Schwachstellen CVSS Base Score 9.9 (kritisch) CVSS Temporal Score 8.9 (hoch) Remoteangriff ja Datum 01.04.2026 Stand 02.04.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
- Windows
Produktbeschreibung
VertiGIS FM ist eine Gebäude Management Software.
Produkte
01.04.2026
- VertiGIS FM <10.11.363
- VertiGIS FM <10.13.403
Angriff
Angriff
Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in VertiGIS FM ausnutzen, um beliebigen Programmcode auszuführen und einen Cross Site Scripting Angriff durchzuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.