Description
SolidCAM-GPPL-IDE is an unofficial, independently developed extension, Postprocessor IDE for SolidCAM. From version 1.0.0 to before version 1.0.2, the inc "filename" directive in GPPL postprocessor files is resolved by GpplDocumentLinkHandler into a clickable link (VS Code textDocument/documentLink). The handler accepted arbitrary paths — absolute, relative with parent-directory segments (..\..\..\), UNC (\\server\share\), and arbitrary subfolders — and called File.Exists on each to decide whether to render the link. Two distinct attack surfaces resulted: information disclosure via File.Exists probing and NTLM hash leak via UNC path probing. This issue has been patched in version 1.0.2.
Published: 2026-05-08
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a path traversal flaw in the inc "filename" directive of SolidCAM‑GPPL‑IDE, an unofficial Postprocessor IDE for SolidCAM. The directive accepts arbitrary path strings—including absolute paths, relative paths with parent-directory segments, and UNC paths—and uses them to resolve VS Code document links. As a result, the handler performs file existence probing on arbitrary local files and on remote UNC shares, exposing whether a file exists and, in the case of UNC probing, leaking NTLM hashes of the underlying Windows system. These capabilities provide an attacker with a mechanism to glean sensitive filesystem information and potentially capture authentication credentials, falling under information disclosure weaknesses.

Affected Systems

The issue affects versions 1.0.0 through 1.0.1 of SolidCAM‑GPPL‑IDE released by anzory. The formal product name is SolidCAM‑GPPL‑IDE, and only the v1.0.2 release and later contain the patch that restricts the allowable paths.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity. The current EPSS information is unavailable, and the vulnerability is not present in the CISA KEV catalog, suggesting no known widespread exploitation yet. An attacker can exploit the flaw by crafting a GPPL postprocessor file with a malicious inc directive, causing the IDE to probe local files and UNC paths; if the victim opens that file, the handler will access the filesystem or remote share, revealing file existence and NTLM hash information. The attack requires the victim to have the vulnerable IDE installed and to open a crafted file, but does not require privileged access on the target system.

Generated by OpenCVE AI on May 8, 2026 at 23:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to SolidCAM‑GPPL‑IDE version 1.0.2 or later to ensure path resolution is safely restricted.
  • If an upgrade is not immediately possible, reconfigure the IDE or its extensions to reject UNC paths and restrict the inc directive to only trusted local directories.
  • Apply appropriate access controls so that only authorized users can edit or view GPPL postprocessor files, thereby limiting the vector for crafted file delivery.

Generated by OpenCVE AI on May 8, 2026 at 23:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 22:00:00 +0000

Type Values Removed Values Added
Description SolidCAM-GPPL-IDE is an unofficial, independently developed extension, Postprocessor IDE for SolidCAM. From version 1.0.0 to before version 1.0.2, the inc "filename" directive in GPPL postprocessor files is resolved by GpplDocumentLinkHandler into a clickable link (VS Code textDocument/documentLink). The handler accepted arbitrary paths — absolute, relative with parent-directory segments (..\..\..\), UNC (\\server\share\), and arbitrary subfolders — and called File.Exists on each to decide whether to render the link. Two distinct attack surfaces resulted: information disclosure via File.Exists probing and NTLM hash leak via UNC path probing. This issue has been patched in version 1.0.2.
Title SolidCAM-GPPL-IDE: Path traversal in `inc` directive enables file probing and NTLM-hash leak
Weaknesses CWE-200
CWE-22
CWE-295
CWE-918
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-08T21:38:40.860Z

Reserved: 2026-04-25T05:04:37.028Z

Link: CVE-2026-42213

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T22:16:32.390

Modified: 2026-05-08T22:16:32.390

Link: CVE-2026-42213

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T00:00:25Z