FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP "Referer" header to validate internal requests. A remote unauthenticated attacker can bypass JWT authentication by spoofing the Referer header to match the server's host. Successful exploitation allows the attacker to access the protected /api/runscript endpoint and execute arbitrary Node.js code on the server.
References
| Link | Resource |
|---|---|
| https://gist.github.com/lihy10/8cb2dd65ebf1385f12a7e00e25a50d40 | Exploit Third Party Advisory |
| https://github.com/frangoteam/FUXA/blob/master/server/api/jwt-helper.js | Product |
Configurations
History
26 Feb 2026, 19:39
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Frangoteam
Frangoteam fuxa |
|
| CPE | cpe:2.3:a:frangoteam:fuxa:*:*:*:*:*:*:*:* | |
| References | () https://gist.github.com/lihy10/8cb2dd65ebf1385f12a7e00e25a50d40 - Exploit, Third Party Advisory | |
| References | () https://github.com/frangoteam/FUXA/blob/master/server/api/jwt-helper.js - Product |
25 Feb 2026, 17:25
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-288 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
24 Feb 2026, 16:24
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-24 16:24
Updated : 2026-02-26 19:39
NVD link : CVE-2025-69985
Mitre link : CVE-2025-69985
CVE.ORG link : CVE-2025-69985
JSON object : View
Products Affected
frangoteam
- fuxa
CWE
CWE-288
Authentication Bypass Using an Alternate Path or Channel
