CVE-2026-26335
CRITICALCalero VeraSMART <2022 R1 - Remote Code Execution
Title source: llmDescription
Calero VeraSMART versions prior to 2022 R1 use static ASP.NET/IIS machineKey values configured for the VeraSMART web application and stored in C:\\Program Files (x86)\\Veramark\\VeraSMART\\WebRoot\\web.config. An attacker who obtains these keys can craft a valid ASP.NET ViewState payload that passes integrity validation and is accepted by the application, resulting in server-side deserialization and remote code execution in the context of the IIS application.
Exploits (2)
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-26335
nomisec
WORKING POC
by mbanyamer · poc
https://github.com/mbanyamer/CVE-2026-26335-Calero-VeraSMART-RCE
Scores
CVSS v3
9.8
EPSS
0.0013
EPSS Percentile
32.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-321
Status
published
Products (2)
calero/verasmart
2022.0
calero/verasmart
< 2022.0
Published
Feb 13, 2026
Tracked Since
Feb 18, 2026