Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69985: n/a

0
Critical
VulnerabilityCVE-2025-69985cvecve-2025-69985
Published: Tue Feb 24 2026 (02/24/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP "Referer" header to validate internal requests. A remote unauthenticated attacker can bypass JWT authentication by spoofing the Referer header to match the server's host. Successful exploitation allows the attacker to access the protected /api/runscript endpoint and execute arbitrary Node.js code on the server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 01:47:02 UTC

Technical Analysis

CVE-2025-69985 is a critical security vulnerability affecting FUXA versions 1.2.8 and prior. The vulnerability is an authentication bypass that leads to remote code execution (RCE) on the affected server. It stems from improper validation logic in the server/api/jwt-helper.js middleware component, which relies on the HTTP Referer header to authenticate internal API requests. Since the Referer header can be trivially spoofed by an attacker, this trust model is fundamentally flawed. By crafting HTTP requests with a Referer header matching the server's host, a remote unauthenticated attacker can bypass JWT-based authentication mechanisms. This unauthorized access grants the attacker entry to the /api/runscript endpoint, which accepts and executes arbitrary Node.js code. The exploitation requires no authentication or user interaction, making it highly accessible to attackers. The vulnerability is classified under CWE-288 (Authentication Bypass by Alternate Path or Channel). The CVSS v3.1 base score is 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no known exploits have been publicly reported, the vulnerability’s nature and impact make it a prime target for attackers seeking full system compromise on vulnerable FUXA deployments.

Potential Impact

The impact of CVE-2025-69985 is severe for organizations using FUXA 1.2.8 or earlier. Successful exploitation results in complete compromise of the affected server through remote code execution. Attackers can run arbitrary Node.js code, potentially leading to data theft, service disruption, lateral movement within internal networks, and deployment of persistent backdoors or ransomware. Since the vulnerability requires no authentication or user interaction, it can be exploited by automated attacks at scale. This poses a significant risk to organizations relying on FUXA for monitoring or automation tasks, especially those exposing the vulnerable API endpoint to untrusted networks. The breach of confidentiality, integrity, and availability can be total, affecting business operations, customer data, and critical infrastructure. Additionally, the ease of exploitation increases the likelihood of rapid weaponization and widespread attacks once public exploit code becomes available.

Mitigation Recommendations

To mitigate CVE-2025-69985, organizations should immediately upgrade FUXA to a version where this vulnerability is patched once available. In the interim, restrict access to the /api/runscript endpoint by implementing network-level controls such as firewall rules or VPN-only access to limit exposure to trusted internal users. Disable or remove the vulnerable jwt-helper.js middleware if feasible or replace the Referer header validation with robust JWT token verification that does not rely on easily spoofed HTTP headers. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious Referer header spoofing attempts targeting the API. Conduct thorough code reviews and penetration testing to identify similar insecure trust assumptions in other parts of the application. Monitor logs for unusual API access patterns and unauthorized code execution attempts. Finally, implement strict Node.js runtime security controls such as sandboxing and least privilege execution to limit the impact of potential code execution vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 699e0f3ebe58cf853b290d4b

Added to database: 2/24/2026, 8:51:10 PM

Last enriched: 3/4/2026, 1:47:02 AM

Last updated: 4/10/2026, 5:46:08 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses