CVE-2025-26646

📊 8.0 HIGH0.0%🎯 0 exploits
📅 Published May 13, 2025
📋 Status: Analyzed

External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.

🎯 Affected Products & Systems

13 product configurations affected

Filter by type:
📱
Application
Vulnerable
Version: < 17.13.7
Target SW: visual_studio
CPE:
cpe:2.3:a:microsoft:build_tools:*:*:*:*:*:visual_studio:*:*
📱
Vulnerable
Version: ≥ 17.8.0 ∧ < 17.8.21
CPE:
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≥ 17.10.0 ∧ < 17.10.15
CPE:
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≥ 17.12.0 ∧ < 17.12.8
CPE:
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
📱
Vulnerable
Version: ≥ 17.13.0 ∧ < 17.13.7
CPE:
cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: ≥ 9.0.0 ∧ < 9.0.5
CPE:
cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: ≥ 8.0.0 ∧ < 8.0.16
CPE:
cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
💻
Operating System
Safe
Version: All versions
CPE:
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
13 productsscroll for more
Metrics
8.0 HIGHCVSS v3.1[email protected]
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
LOW
User Interaction:
REQUIRED
Confidentiality:
HIGH
Integrity:
HIGH
Availability:
HIGH
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
8.0 (HIGH)v3.1
EPSS Details
0.0% (Minimal)9.7th percentile
Last updated: Nov 1, 2025
Exploitation probability within 30 days
Published Date
May 13, 2025 (5 months ago)
Last Modified
Jul 10, 2025 (3 months ago)
Security Weaknesses1
References2