-
Notifications
You must be signed in to change notification settings - Fork 213
Open
Labels
Description
- Identifier of the vulnerability: CVE-2026-25938
- Affected software: FUXA (https://github.com/frangoteam/FUXA) - SCADA/HMI/IoT platform for industrial automation
- Type of vulnerability: RCE (Unauthenticated Remote Code Execution)
- CVSS Score: 9.5 Critical (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)
- Impact: An unauthenticated remote attacker can send a specially crafted request to the /nodered/flows endpoint to bypass authentication checks, granting administrative access to the Node-RED deployment API. By submitting a malicious flow configuration, the attacker executes arbitrary code in the context of the FUXA service. This affects deployments with the Node-RED plugin enabled, including those with secureEnabled set to true. Depending on deployment, this may lead to full system compromise and could further expose connected ICS/SCADA environments.
- Patched version: 1.2.11
- Affected versions: >= 1.2.8, < 1.2.11
- Language you would use for writing the plugin: Templated (textproto) or Java
- Resources:
Reactions are currently unavailable