Vulnerability Details CVE-2025-26646
External control of file name or path in .NET, Visual Studio, and Build Tools for Visual Studio allows an authorized attacker to perform spoofing over a network.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 11.3%
CVSS Severity
CVSS v3 Score 8.0
Products affected by CVE-2025-26646
-
cpe:2.3:a:microsoft:.net:8.0.0
-
cpe:2.3:a:microsoft:.net:8.0.1
-
cpe:2.3:a:microsoft:.net:8.0.10
-
cpe:2.3:a:microsoft:.net:8.0.11
-
cpe:2.3:a:microsoft:.net:8.0.12
-
cpe:2.3:a:microsoft:.net:8.0.13
-
cpe:2.3:a:microsoft:.net:8.0.14
-
cpe:2.3:a:microsoft:.net:8.0.15
-
cpe:2.3:a:microsoft:.net:8.0.2
-
cpe:2.3:a:microsoft:.net:8.0.3
-
cpe:2.3:a:microsoft:.net:8.0.4
-
cpe:2.3:a:microsoft:.net:8.0.5
-
cpe:2.3:a:microsoft:.net:8.0.6
-
cpe:2.3:a:microsoft:.net:8.0.7
-
cpe:2.3:a:microsoft:.net:8.0.8
-
cpe:2.3:a:microsoft:.net:8.0.9
-
cpe:2.3:a:microsoft:.net:9.0.0
-
cpe:2.3:a:microsoft:.net:9.0.1
-
cpe:2.3:a:microsoft:.net:9.0.2
-
cpe:2.3:a:microsoft:.net:9.0.3
-
cpe:2.3:a:microsoft:.net:9.0.4
-
cpe:2.3:a:microsoft:build_tools:-
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.0
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.1
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.10
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.11
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.12
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.13
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.14
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.2
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.3
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.4
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.5
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.6
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.7
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.8
-
cpe:2.3:a:microsoft:visual_studio_2022:17.10.9
-
cpe:2.3:a:microsoft:visual_studio_2022:17.12.0
-
cpe:2.3:a:microsoft:visual_studio_2022:17.12.1
-
cpe:2.3:a:microsoft:visual_studio_2022:17.12.2
-
cpe:2.3:a:microsoft:visual_studio_2022:17.12.3
-
cpe:2.3:a:microsoft:visual_studio_2022:17.12.4
-
cpe:2.3:a:microsoft:visual_studio_2022:17.12.5
-
cpe:2.3:a:microsoft:visual_studio_2022:17.12.6
-
cpe:2.3:a:microsoft:visual_studio_2022:17.12.7
-
cpe:2.3:a:microsoft:visual_studio_2022:17.13.0
-
cpe:2.3:a:microsoft:visual_studio_2022:17.13.1
-
cpe:2.3:a:microsoft:visual_studio_2022:17.13.2
-
cpe:2.3:a:microsoft:visual_studio_2022:17.13.3
-
cpe:2.3:a:microsoft:visual_studio_2022:17.13.4
-
cpe:2.3:a:microsoft:visual_studio_2022:17.13.5
-
cpe:2.3:a:microsoft:visual_studio_2022:17.13.6
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.0
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.1
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.10
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.11
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.12
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.13
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.14
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.15
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.16
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.17
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.18
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.19
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.2
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.20
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.3
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.4
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.5
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.6
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.7
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.8
-
cpe:2.3:a:microsoft:visual_studio_2022:17.8.9
-
-
cpe:2.3:o:linux:linux_kernel:-
-
cpe:2.3:o:microsoft:windows:-