Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-4r4r-4jp4-wwf9 | FUXA has JWT Authentication Bypass via HTTP Referer header spoofing |
Thu, 26 Feb 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:frangoteam:fuxa:*:*:*:*:*:*:*:* |
Wed, 25 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-288 | |
| Metrics |
cvssV3_1
|
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Frangoteam
Frangoteam fuxa |
|
| Vendors & Products |
Frangoteam
Frangoteam fuxa |
Tue, 24 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP "Referer" header to validate internal requests. A remote unauthenticated attacker can bypass JWT authentication by spoofing the Referer header to match the server's host. Successful exploitation allows the attacker to access the protected /api/runscript endpoint and execute arbitrary Node.js code on the server. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-02-25T16:31:17.905Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-69985
No data.
Status : Analyzed
Published: 2026-02-24T16:24:07.120
Modified: 2026-02-26T19:39:20.677
Link: CVE-2025-69985
No data.
OpenCVE Enrichment
Updated: 2026-02-25T11:45:20Z
Github GHSA