Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-30882 | A maliciously crafted HTML payload, when rendered by the Autodesk Fusion desktop application, can trigger a Stored Cross-site Scripting (XSS) vulnerability. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process. |
Sat, 28 Feb 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Mon, 01 Dec 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:autodesk:fusion:*:*:*:*:*:*:*:* |
Tue, 23 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 23 Sep 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A maliciously crafted HTML payload, when rendered by the Autodesk Fusion desktop application, can trigger a Stored Cross-site Scripting (XSS) vulnerability. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process. | |
| Title | HTML Payload Stored Cross-Site Scripting (XSS) Vulnerability | |
| First Time appeared |
Autodesk
Autodesk fusion |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:autodesk:fusion:2602.1.25:*:*:*:*:*:*:* | |
| Vendors & Products |
Autodesk
Autodesk fusion |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2026-02-26T17:48:18.594Z
Reserved: 2025-09-10T18:15:02.692Z
Link: CVE-2025-10244
Updated: 2025-09-23T19:24:56.024Z
Status : Analyzed
Published: 2025-09-23T12:15:28.463
Modified: 2025-12-01T18:23:22.233
Link: CVE-2025-10244
No data.
OpenCVE Enrichment
No data.
EUVD