Critical severityNVD Advisory· Published Feb 9, 2026· Updated Feb 11, 2026
FUXA Unauthenticated Remote Code Execution via Admin JWT Minting
CVE-2026-25893
Description
FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. Prior to 1.2.10, an authentication bypass vulnerability in FUXA allows an unauthenticated, remote attacker to gain administrative access via the heartbeat refresh API and execute arbitrary code on the server. This issue has been patched in FUXA version 1.2.10.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
fuxa-servernpm | < 1.2.10 | 1.2.10 |
Affected products
1- Range: < 1.2.10
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-vwcg-c828-9822ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-25893ghsaADVISORY
- github.com/frangoteam/FUXA/commit/fe82348d160904d0013b9a3e267d50158f5c7afbghsax_refsource_MISCWEB
- github.com/frangoteam/FUXA/security/advisories/GHSA-vwcg-c828-9822ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.