Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 26 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 03 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:autodesk:fusion:2603.0:*:*:*:*:*:*:* |
Fri, 30 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:autodesk:fusion:*:*:*:*:*:*:*:* |
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Autodesk
Autodesk fusion |
|
| Vendors & Products |
Autodesk
Autodesk fusion |
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A maliciously crafted HTML payload in a design name, when displayed during the delete confirmation dialog and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process. | |
| Title | Stored XSS in Fusion desktop when attempting to delete a file | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2026-02-26T14:44:31.809Z
Reserved: 2025-12-19T18:57:06.177Z
Link: CVE-2026-0533
Updated: 2026-02-25T16:27:37.752Z
Status : Analyzed
Published: 2026-01-22T17:16:28.937
Modified: 2026-01-30T17:07:29.903
Link: CVE-2026-0533
No data.
OpenCVE Enrichment
Updated: 2026-04-18T03:45:21Z