Skip to content

PRP: FUXA CVE-2026-25938 Unauthenticated Remote Code Execution via Node-RED Integration #809

@wannabemrrobot

Description

@wannabemrrobot
  • Identifier of the vulnerability: CVE-2026-25938
  • Affected software: FUXA (https://github.com/frangoteam/FUXA) - SCADA/HMI/IoT platform for industrial automation
  • Type of vulnerability: RCE (Unauthenticated Remote Code Execution)
  • CVSS Score: 9.5 Critical (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)
  • Impact: An unauthenticated remote attacker can send a specially crafted request to the /nodered/flows endpoint to bypass authentication checks, granting administrative access to the Node-RED deployment API. By submitting a malicious flow configuration, the attacker executes arbitrary code in the context of the FUXA service. This affects deployments with the Node-RED plugin enabled, including those with secureEnabled set to true. Depending on deployment, this may lead to full system compromise and could further expose connected ICS/SCADA environments.
  • Patched version: 1.2.11
  • Affected versions: >= 1.2.8, < 1.2.11
  • Language you would use for writing the plugin: Templated (textproto) or Java
  • Resources:

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions