Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-v4p5-w6r3-2x4f | FUXA Unauthenticated Remote Code Execution in Node-RED Integration |
Fri, 13 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:frangoteam:fuxa:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 11 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Frangoteam
Frangoteam fuxa |
|
| Vendors & Products |
Frangoteam
Frangoteam fuxa |
Mon, 09 Feb 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. From 1.2.8 through 1.2.10, an authentication bypass vulnerability in FUXA allows an unauthenticated, remote attacker to execute arbitrary code on the server when the Node-RED plugin is enabled. This has been patched in FUXA version 1.2.11. | |
| Title | FUXA Unauthenticated Remote Code Execution in Node-RED Integration | |
| Weaknesses | CWE-290 CWE-306 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-11T21:22:19.452Z
Reserved: 2026-02-09T16:22:17.786Z
Link: CVE-2026-25938
Updated: 2026-02-11T21:22:17.137Z
Status : Analyzed
Published: 2026-02-09T23:16:06.100
Modified: 2026-02-13T20:31:47.513
Link: CVE-2026-25938
No data.
OpenCVE Enrichment
Updated: 2026-04-18T13:00:08Z
Github GHSA