Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:autodesk:fusion:*:*:*:*:*:*:*:* |
Tue, 14 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 14 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A maliciously crafted HTML payload, stored in a design name and exported to CSV, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process. | |
| Title | Stored Cross-Site Scripting (XSS) Vulnerability in Design Name | |
| First Time appeared |
Autodesk
Autodesk fusion |
|
| Weaknesses | CWE-79 | |
| CPEs | cpe:2.3:a:autodesk:fusion:2606.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Autodesk
Autodesk fusion |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2026-04-15T03:58:16.255Z
Reserved: 2026-03-17T15:57:30.015Z
Link: CVE-2026-4345
Updated: 2026-04-14T15:03:32.911Z
Status : Analyzed
Published: 2026-04-14T15:16:38.640
Modified: 2026-04-22T15:04:58.727
Link: CVE-2026-4345
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:30:27Z