VYPR
Critical severityNVD Advisory· Published Feb 24, 2026· Updated Feb 25, 2026

CVE-2025-69985

CVE-2025-69985

Description

FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP "Referer" header to validate internal requests. A remote unauthenticated attacker can bypass JWT authentication by spoofing the Referer header to match the server's host. Successful exploitation allows the attacker to access the protected /api/runscript endpoint and execute arbitrary Node.js code on the server.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

FUXA 1.2.8 contains an authentication bypass in its JWT middleware that trusts the HTTP Referer header, allowing unauthenticated attackers to execute arbitrary Node.js code.

Vulnerability

Overview

CVE-2025-69985 is an authentication bypass vulnerability in FUXA version 1.2.8 and prior, a web-based SCADA/HMI platform [2][3]. The flaw resides in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP Referer header to validate internal requests [2]. The system whitelists requests containing /fuxa in the Referer header, effectively allowing any request that includes this string to bypass JWT authentication [1]. This is described as an incomplete fix for a previously identified issue (CVE-2023-33831) [1].

Exploitation

Method

A remote unauthenticated attacker can bypass JWT authentication by crafting HTTP requests with a Referer header that matches the server's host or includes /fuxa [2][1]. No prior authentication or network position is required beyond network access to the FUXA server. Once authentication is bypassed, the attacker gains access to protected endpoints, most notably the /api/runscript endpoint [2].

Impact

Successful exploitation allows the attacker to execute arbitrary Node.js code on the server [2]. Proof-of-concept scripts demonstrate remote code execution (e.g., launching calc.exe on Windows) and the ability to overwrite the SQLite user database to take over the admin account [1]. This can lead to full compromise of the FUXA server, disruption of industrial monitoring processes, and potential lateral movement within the operational network.

Mitigation

Status

As of the CVE publication date (2026-02-24) and the latest available information, FUXA version 1.2.8 is the affected version; users should upgrade to a patched release if available from the official repository (https://github.com/frangoteam/FUXA) [3]. No workarounds are described in the references.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
@frangoteam/fuxanpm
<= 1.2.8

Affected products

2
  • FUXA/FUXAdescription
  • FUXA/FUXAllm-create
    Range: <=1.2.8

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.