Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-68m5-5w2h-h837 | FUXA Affected by a Path Traversal Sanitization Bypass |
Fri, 13 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:frangoteam:fuxa:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Wed, 11 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 10 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Frangoteam
Frangoteam fuxa |
|
| Vendors & Products |
Frangoteam
Frangoteam fuxa |
Mon, 09 Feb 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. Prior to 1.2.11, there is a flaw in the path sanitization logic allows an authenticated attacker with administrative privileges to bypass directory traversal protections. By using nested traversal sequences (e.g., ....//), an attacker can write arbitrary files to the server filesystem, including sensitive directories like runtime/scripts. This leads to Remote Code Execution (RCE) when the server reloads the malicious scripts. This vulnerability is fixed in 1.2.11. | |
| Title | FUXA has a Path Traversal Sanitization Bypass | |
| Weaknesses | CWE-184 CWE-22 CWE-23 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-11T21:24:18.690Z
Reserved: 2026-02-09T17:13:54.065Z
Link: CVE-2026-25951
Updated: 2026-02-11T21:24:16.243Z
Status : Analyzed
Published: 2026-02-09T23:16:06.630
Modified: 2026-02-13T20:28:36.930
Link: CVE-2026-25951
No data.
OpenCVE Enrichment
Updated: 2026-04-17T21:15:27Z
Github GHSA