Impact
A maliciously crafted HTML payload can be stored inside a design name and then exported to CSV, triggering a stored Cross‑Site Scripting vulnerability in Autodesk Fusion desktop. The flaw allows an attacker to read local files or execute arbitrary code in the context of the Fusion process, exposing confidentiality, integrity, or availability of data. The weakness corresponds to CWE‑79.
Affected Systems
The affected product is Autodesk Fusion desktop, specifically version 2606.0. This release, as identified by its CPE designation, is vulnerable, and any older builds that use a similar identifier may also be impacted.
Risk and Exploitability
The CVSS v3.1 score is 7.1, indicating high severity. EPSS information is not available and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires a user to open the compromised design or export it to CSV, implying a user‑dependent or local attack vector. Once the payload is rendered, an attacker can read arbitrary files or execute code with the same privileges as the Fusion process.
OpenCVE Enrichment