FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An insecure default configuration in FUXA allows an unauthenticated, remote attacker to gain administrative access and execute arbitrary code on the server. This affects FUXA through version 1.2.9 when authentication is enabled, but the administrator JWT secret is not configured. This issue has been patched in FUXA version 1.2.10.
References
Configurations
History
13 Feb 2026, 20:33
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Frangoteam
Frangoteam fuxa |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| CPE | cpe:2.3:a:frangoteam:fuxa:*:*:*:*:*:*:*:* | |
| References | () https://github.com/frangoteam/FUXA/commit/ea7b3df066f9fdef8ecdce318398ae40546bc50d - Patch | |
| References | () https://github.com/frangoteam/FUXA/releases/tag/v1.2.10 - Release Notes | |
| References | () https://github.com/frangoteam/FUXA/security/advisories/GHSA-32cc-x95p-fxcg - Vendor Advisory |
09 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 23:16
Updated : 2026-02-13 20:33
NVD link : CVE-2026-25894
Mitre link : CVE-2026-25894
CVE.ORG link : CVE-2026-25894
JSON object : View
Products Affected
frangoteam
- fuxa
