CVE-2026-26335

CRITICAL

Calero VeraSMART <2022 R1 - Remote Code Execution

Title source: llm

Description

Calero VeraSMART versions prior to 2022 R1 use static ASP.NET/IIS machineKey values configured for the VeraSMART web application and stored in C:\\Program Files (x86)\\Veramark\\VeraSMART\\WebRoot\\web.config. An attacker who obtains these keys can craft a valid ASP.NET ViewState payload that passes integrity validation and is accepted by the application, resulting in server-side deserialization and remote code execution in the context of the IIS application.

Exploits (2)

github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-26335
nomisec WORKING POC
by mbanyamer · poc
https://github.com/mbanyamer/CVE-2026-26335-Calero-VeraSMART-RCE

Scores

CVSS v3 9.8
EPSS 0.0013
EPSS Percentile 32.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-321
Status published
Products (2)
calero/verasmart 2022.0
calero/verasmart < 2022.0
Published Feb 13, 2026
Tracked Since Feb 18, 2026