Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0534: CWE-79 Cross-Site Scripting (XSS) - Stored in Autodesk Fusion

0
High
VulnerabilityCVE-2026-0534cvecve-2026-0534cwe-79
Published: Thu Jan 22 2026 (01/22/2026, 16:59:01 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Fusion

Description

A maliciously crafted HTML payload, stored in a part’s attribute and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 01/31/2026, 08:09:26 UTC

Technical Analysis

CVE-2026-0534 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in Autodesk Fusion desktop application version 2603.0. The vulnerability occurs when a malicious actor injects crafted HTML payloads into a part’s attribute within the application. When a user interacts with the affected part attribute, the payload executes in the context of the Fusion application process. This can lead to arbitrary code execution or unauthorized reading of local files, compromising confidentiality and integrity. The attack vector is local (AV:L), requiring low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), with high impact on confidentiality and integrity (C:H/I:H) but no impact on availability (A:N). Although no exploits are currently known in the wild, the vulnerability poses a significant risk due to the ability to execute code locally, potentially enabling further compromise of the host system or lateral movement within a network. Autodesk Fusion is widely used in CAD and design workflows, making this vulnerability particularly relevant to organizations relying on these tools for product development and manufacturing. The lack of a patch link indicates that a fix may still be pending or in development, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, especially those in manufacturing, engineering, and design sectors, this vulnerability could lead to unauthorized access to sensitive design files and intellectual property. Exploitation could allow attackers to execute arbitrary code, potentially leading to further system compromise or data exfiltration. The confidentiality and integrity of critical design data are at risk, which can disrupt product development cycles and damage competitive advantage. Since Autodesk Fusion is used extensively in countries with strong industrial bases, the impact could extend to supply chain security and operational continuity. The requirement for user interaction limits mass exploitation but targeted attacks against key personnel remain a concern. Additionally, compromised systems could serve as footholds for broader network intrusions, increasing the overall risk posture of affected organizations.

Mitigation Recommendations

Organizations should monitor Autodesk’s official channels for patches addressing CVE-2026-0534 and apply them promptly once released. Until a patch is available, restrict the import and use of untrusted parts or files within Autodesk Fusion to minimize exposure. Implement strict input validation and sanitization policies for part attributes if customization is possible. Educate users on the risks of interacting with unverified parts or files, emphasizing caution with unexpected or suspicious content. Employ endpoint security solutions capable of detecting anomalous behavior within the Fusion application process. Consider isolating Fusion workstations from critical network segments to limit potential lateral movement. Regularly back up design data and maintain incident response plans tailored to software compromise scenarios. Finally, coordinate with Autodesk support to understand any interim workarounds or configuration changes that reduce risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-12-19T18:57:19.012Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69725c7b4623b1157c80749f

Added to database: 1/22/2026, 5:20:59 PM

Last enriched: 1/31/2026, 8:09:26 AM

Last updated: 2/6/2026, 1:05:59 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats