Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:autodesk:fusion:*:*:*:*:*:*:*:* |
Tue, 14 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A maliciously crafted HTML payload in a component name, when displayed during the delete confirmation dialog and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process. | |
| Title | Stored Cross-Site Scripting (XSS) Vulnerability in Assembly Component Name | |
| First Time appeared |
Autodesk
Autodesk fusion |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:autodesk:fusion:2606.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Autodesk
Autodesk fusion |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2026-04-15T03:58:14.791Z
Reserved: 2026-03-17T15:57:23.974Z
Link: CVE-2026-4344
Updated: 2026-04-14T15:06:58.811Z
Status : Analyzed
Published: 2026-04-14T15:16:38.467
Modified: 2026-04-22T15:04:34.123
Link: CVE-2026-4344
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:30:26Z