FUXA Unauthenticated Exposure of Plaintext Database Credentials
Description
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An information disclosure vulnerability in FUXA allows an unauthenticated, remote attacker to retrieve sensitive administrative database credentials. Exploitation allows an unauthenticated, remote attacker to obtain the full system configuration, including administrative credentials for the InfluxDB database. Possession of these credentials may allow an attacker to authenticate directly to the database service, enabling them to read, modify, or delete all historical process data, or perform a Denial of Service by corrupting the database. This affects FUXA through version 1.2.9. This issue has been patched in FUXA version 1.2.10.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
fuxa-servernpm | < 1.2.10 | 1.2.10 |
Affected products
1- Range: < 1.2.10
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-c5gq-4h56-4mmxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25751ghsaADVISORY
- github.com/frangoteam/FUXA/commit/c6c4cba1a62545e8e3ae0f43b2269e61209fbee8ghsaWEB
- github.com/frangoteam/FUXA/releases/tag/v1.2.10ghsax_refsource_MISCWEB
- github.com/frangoteam/FUXA/security/advisories/GHSA-c5gq-4h56-4mmxghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.