CVE-2025-69985

FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP "Referer" header to validate internal requests. A remote unauthenticated attacker can bypass JWT authentication by spoofing the Referer header to match the server's host. Successful exploitation allows the attacker to access the protected /api/runscript endpoint and execute arbitrary Node.js code on the server.
Configurations

Configuration 1 (hide)

cpe:2.3:a:frangoteam:fuxa:*:*:*:*:*:*:*:*

History

26 Feb 2026, 19:39

Type Values Removed Values Added
First Time Frangoteam
Frangoteam fuxa
CPE cpe:2.3:a:frangoteam:fuxa:*:*:*:*:*:*:*:*
References () https://gist.github.com/lihy10/8cb2dd65ebf1385f12a7e00e25a50d40 - () https://gist.github.com/lihy10/8cb2dd65ebf1385f12a7e00e25a50d40 - Exploit, Third Party Advisory
References () https://github.com/frangoteam/FUXA/blob/master/server/api/jwt-helper.js - () https://github.com/frangoteam/FUXA/blob/master/server/api/jwt-helper.js - Product

25 Feb 2026, 17:25

Type Values Removed Values Added
CWE CWE-288
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8

24 Feb 2026, 16:24

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-24 16:24

Updated : 2026-02-26 19:39


NVD link : CVE-2025-69985

Mitre link : CVE-2025-69985

CVE.ORG link : CVE-2025-69985


JSON object : View

Products Affected

frangoteam

  • fuxa
CWE
CWE-288

Authentication Bypass Using an Alternate Path or Channel