Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0533: CWE-79 Cross-Site Scripting (XSS) - Stored in Autodesk Fusion

0
High
VulnerabilityCVE-2026-0533cvecve-2026-0533cwe-79
Published: Thu Jan 22 2026 (01/22/2026, 16:58:43 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Fusion

Description

A maliciously crafted HTML payload in a design name, when displayed during the delete confirmation dialog and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 01/31/2026, 08:09:12 UTC

Technical Analysis

CVE-2026-0533 is a stored Cross-Site Scripting (XSS) vulnerability identified in Autodesk Fusion desktop application version 2603.0. The flaw occurs when a malicious actor crafts an HTML payload embedded within a design name. This payload is stored and later rendered in the delete confirmation dialog within the application. When a user views this dialog and clicks on the maliciously crafted design name, the embedded script executes in the context of the current application process. This execution can lead to unauthorized reading of local files or execution of arbitrary code, compromising the confidentiality and integrity of the user's data and system. The vulnerability does not require prior authentication but does require user interaction (clicking the malicious design name). The CVSS v3.1 base score is 7.1, reflecting high severity due to the potential for significant impact on confidentiality and integrity with relatively low attack complexity. No patches are currently linked, and no known exploits have been reported in the wild. The vulnerability is classified under CWE-79, indicating improper neutralization of input during web page generation. Autodesk Fusion is widely used in design and engineering workflows, making this vulnerability particularly relevant to organizations relying on this software for critical design processes.

Potential Impact

For European organizations, the impact of CVE-2026-0533 can be substantial, especially in sectors such as manufacturing, automotive, aerospace, and industrial design where Autodesk Fusion is commonly used. Exploitation could lead to unauthorized access to sensitive design files, intellectual property theft, or execution of malicious code that could further compromise internal systems. The confidentiality of proprietary designs and project data is at risk, potentially leading to competitive disadvantages or regulatory compliance issues under GDPR if personal or sensitive data is involved. Although availability is not directly impacted, the integrity of design data and the trustworthiness of the design environment could be undermined, causing operational disruptions. The requirement for user interaction limits mass exploitation but targeted spear-phishing or insider threat scenarios remain plausible. The lack of known exploits in the wild suggests a window of opportunity for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Immediately implement strict input validation and sanitization on all user-supplied data fields within Autodesk Fusion, especially design names, to neutralize HTML or script content before rendering. 2. Monitor Autodesk’s security advisories closely and apply official patches or updates as soon as they become available. 3. Educate users on the risks of interacting with unexpected or suspicious design names, particularly in shared or collaborative environments. 4. Employ application whitelisting and endpoint protection solutions to detect and block unauthorized code execution within the Fusion application context. 5. Restrict permissions and access controls to limit who can create or modify design names, reducing the attack surface. 6. Consider isolating Autodesk Fusion usage to segmented network zones to contain potential exploitation impact. 7. Conduct regular security audits and penetration testing focusing on input handling and UI rendering components of Autodesk Fusion deployments. 8. Implement logging and monitoring to detect anomalous behaviors indicative of exploitation attempts, such as unusual file access or script execution patterns.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-12-19T18:57:06.177Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69725c7b4623b1157c80749a

Added to database: 1/22/2026, 5:20:59 PM

Last enriched: 1/31/2026, 8:09:12 AM

Last updated: 2/4/2026, 5:54:53 PM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats