No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 12 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Anzory
Anzory solidcam-gppl-ide |
|
| Vendors & Products |
Anzory
Anzory solidcam-gppl-ide |
Fri, 08 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SolidCAM-GPPL-IDE is an unofficial, independently developed extension, Postprocessor IDE for SolidCAM. From version 1.0.0 to before version 1.0.2, the inc "filename" directive in GPPL postprocessor files is resolved by GpplDocumentLinkHandler into a clickable link (VS Code textDocument/documentLink). The handler accepted arbitrary paths — absolute, relative with parent-directory segments (..\..\..\), UNC (\\server\share\), and arbitrary subfolders — and called File.Exists on each to decide whether to render the link. Two distinct attack surfaces resulted: information disclosure via File.Exists probing and NTLM hash leak via UNC path probing. This issue has been patched in version 1.0.2. | |
| Title | SolidCAM-GPPL-IDE: Path traversal in `inc` directive enables file probing and NTLM-hash leak | |
| Weaknesses | CWE-200 CWE-22 CWE-295 CWE-918 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-12T18:31:53.871Z
Reserved: 2026-04-25T05:04:37.028Z
Link: CVE-2026-42213
Updated: 2026-05-12T12:59:12.837Z
Status : Deferred
Published: 2026-05-08T22:16:32.390
Modified: 2026-05-12T19:16:32.560
Link: CVE-2026-42213
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:24:48Z