Impact
An authentication bypass in FUXA allows an unauthenticated, remote attacker to execute arbitrary code on the server when the Node-RED plugin is enabled. The vulnerability allows privileged operations without authentication, and it is related to authentication weaknesses as classified by CWE-290 and CWE-306.
Affected Systems
The vulnerability affects the FUXA web-based process visualization platform from frangoteam, specifically versions 1.2.8 through 1.2.10 when the Node-RED integration is activated. The issue has been corrected in FUXA 1.2.11 and later releases.
Risk and Exploitability
The CVSS score of 9.5 indicates a critical severity, with an EPSS score below 1% suggesting a currently low probability of exploitation, though that could rise as the vulnerability becomes widely known. The vulnerability is not listed in the CISA KEV catalog. Attackers can send unauthenticated requests to the FUXA server over the network; if the Node-RED plugin is enabled, the vulnerability permits arbitrary code execution on the host, leading to full system compromise. Defensive measures must therefore focus on patching or disabling the vulnerable component.
OpenCVE Enrichment
Github GHSA