FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP "Referer" header to validate internal requests. A remote unauthenticated attacker can bypass JWT authentication by spoofing the Referer header to match the server's host. Successful exploitation allows the attacker to access the protected /api/runscript endpoint and execute arbitrary Node.js code on the server.
History

Wed, 25 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-288
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Frangoteam
Frangoteam fuxa
Vendors & Products Frangoteam
Frangoteam fuxa

Tue, 24 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
Description FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP "Referer" header to validate internal requests. A remote unauthenticated attacker can bypass JWT authentication by spoofing the Referer header to match the server's host. Successful exploitation allows the attacker to access the protected /api/runscript endpoint and execute arbitrary Node.js code on the server.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-02-24T00:00:00.000Z

Updated: 2026-02-25T16:31:17.905Z

Reserved: 2026-01-09T00:00:00.000Z

Link: CVE-2025-69985

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-02-24T16:24:07.120

Modified: 2026-02-25T17:25:21.793

Link: CVE-2025-69985

cve-icon Redhat

No data.