FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. From 1.2.8 through 1.2.10, an authentication bypass vulnerability in FUXA allows an unauthenticated, remote attacker to execute arbitrary code on the server when the Node-RED plugin is enabled. This has been patched in FUXA version 1.2.11.
References
Configurations
History
13 Feb 2026, 20:31
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:frangoteam:fuxa:*:*:*:*:*:*:*:* | |
| First Time |
Frangoteam
Frangoteam fuxa |
|
| References | () https://github.com/frangoteam/FUXA/commit/5e7679b09718534e4501a146fdfe093da29af336 - Patch | |
| References | () https://github.com/frangoteam/FUXA/releases/tag/v1.2.11 - Release Notes | |
| References | () https://github.com/frangoteam/FUXA/security/advisories/GHSA-v4p5-w6r3-2x4f - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
09 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 23:16
Updated : 2026-02-13 20:31
NVD link : CVE-2026-25938
Mitre link : CVE-2026-25938
CVE.ORG link : CVE-2026-25938
JSON object : View
Products Affected
frangoteam
- fuxa
