CVE-2025-69985

CRITICAL
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 21:55 vuln.today
PoC Detected
Feb 26, 2026 - 19:39 vuln.today
Public exploit code
CVE Published
Feb 24, 2026 - 16:24 nvd
CRITICAL 9.8

Description

FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP "Referer" header to validate internal requests. A remote unauthenticated attacker can bypass JWT authentication by spoofing the Referer header to match the server's host. Successful exploitation allows the attacker to access the protected /api/runscript endpoint and execute arbitrary Node.js code on the server.

Analysis

Authentication bypass in FUXA SCADA/HMI system 1.2.8 and prior leading to Remote Code Execution. Unauthenticated attackers can execute arbitrary code on industrial control HMI systems. EPSS 0.64% with PoC available.

Technical Context

CWE-288 authentication bypass. FUXA is an open-source SCADA/HMI system — this vulnerability allows unauthenticated code execution.

Affected Products

['FUXA <= 1.2.8']

Remediation

Update FUXA. Never expose SCADA/HMI systems to the internet. Implement network segmentation.

Priority Score

70
Low Medium High Critical
KEV: 0
EPSS: +0.6
CVSS: +49
POC: +20

Share

CVE-2025-69985 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy