Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0534: CWE-79 Cross-Site Scripting (XSS) - Stored in Autodesk Fusion

0
High
VulnerabilityCVE-2026-0534cvecve-2026-0534cwe-79
Published: Thu Jan 22 2026 (01/22/2026, 16:59:01 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Fusion

Description

A maliciously crafted HTML payload, stored in a part’s attribute and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:22:28 UTC

Technical Analysis

CVE-2026-0534 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting Autodesk Fusion desktop application version 2603.0. The vulnerability occurs when a malicious actor crafts an HTML payload embedded within a part’s attribute. When a user clicks on this part attribute within the Fusion interface, the payload executes in the context of the running application process. This execution can lead to arbitrary code execution or unauthorized reading of local files, compromising confidentiality and integrity of the user's system and data. The attack vector is local, requiring the attacker to have the ability to inject or supply malicious parts to the victim and rely on user interaction (click). The vulnerability does not require prior authentication, increasing its risk if malicious parts are shared or imported from untrusted sources. The CVSS v3.1 score is 7.1 (High), reflecting high confidentiality and integrity impact, low attack complexity, no privileges required, and user interaction needed. Although no exploits are currently known in the wild, the potential for abuse in environments where Autodesk Fusion is used for sensitive design and engineering work is significant. The lack of available patches at the time of publication necessitates immediate mitigation efforts by users and organizations.

Potential Impact

The primary impact of this vulnerability is on the confidentiality and integrity of systems running Autodesk Fusion. Successful exploitation can lead to arbitrary code execution within the application’s process context, potentially allowing attackers to read sensitive local files or manipulate design data. This can result in intellectual property theft, sabotage of engineering projects, or further compromise of the host system. Since Autodesk Fusion is widely used in engineering, manufacturing, and design sectors, organizations in these industries face risks of operational disruption and data breaches. The requirement for user interaction limits mass exploitation but targeted attacks, especially through shared design files or collaborative environments, remain a significant threat. The vulnerability does not affect availability directly but could lead to broader system compromise if leveraged in multi-stage attacks.

Mitigation Recommendations

To mitigate CVE-2026-0534, organizations should: 1) Monitor Autodesk’s official channels for patches or updates addressing this vulnerability and apply them promptly once available. 2) Implement strict validation and sanitization of any imported or shared design parts to prevent malicious payloads from entering the environment. 3) Educate users to avoid clicking on suspicious or untrusted part attributes within Autodesk Fusion. 4) Employ application whitelisting and endpoint protection solutions to detect and block anomalous code execution within Fusion’s process context. 5) Restrict the sharing and importing of design files to trusted sources only, and consider sandboxing or isolated environments for testing untrusted files. 6) Regularly audit and monitor Fusion application logs and system behavior for signs of exploitation attempts. These steps go beyond generic advice by focusing on controlling the attack vector (malicious parts) and user behavior, as well as leveraging endpoint security to contain potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-12-19T18:57:19.012Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69725c7b4623b1157c80749f

Added to database: 1/22/2026, 5:20:59 PM

Last enriched: 2/27/2026, 8:22:28 AM

Last updated: 3/24/2026, 11:35:20 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses