Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0535: CWE-79 Cross-Site Scripting (XSS) - Stored in Autodesk Fusion

0
High
VulnerabilityCVE-2026-0535cvecve-2026-0535cwe-79
Published: Thu Jan 22 2026 (01/22/2026, 16:59:34 UTC)
Source: CVE Database V5
Vendor/Project: Autodesk
Product: Fusion

Description

A maliciously crafted HTML payload, stored in a component’s description and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process.

AI-Powered Analysis

AILast updated: 01/31/2026, 08:09:40 UTC

Technical Analysis

CVE-2026-0535 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting Autodesk Fusion desktop application version 2603.0. The vulnerability arises when a malicious actor injects a crafted HTML payload into a component’s description field. When a user clicks on this component description within the Fusion application, the embedded script executes in the context of the running process. This execution context allows the attacker to perform actions such as reading local files or executing arbitrary code, effectively compromising the confidentiality and integrity of the user's environment. The attack vector is local (AV:L), meaning the attacker must have local access to the system or the ability to influence the component description content. The attack complexity is low (AC:L), requiring no special conditions beyond user interaction (UI:R). No privileges are required (PR:N), and the scope remains unchanged (S:U). The vulnerability does not impact availability (A:N). Although no known exploits are currently reported in the wild, the potential for significant damage exists due to the ability to execute code and access sensitive files. Autodesk Fusion is widely used in design, engineering, and manufacturing workflows, making this vulnerability particularly relevant to organizations relying on this software for critical operations. The lack of a published patch at the time of disclosure necessitates immediate mitigation efforts to reduce risk.

Potential Impact

For European organizations, the impact of CVE-2026-0535 is significant, especially those in sectors relying heavily on Autodesk Fusion, such as automotive, aerospace, industrial design, and manufacturing. Successful exploitation can lead to unauthorized disclosure of sensitive design files, intellectual property theft, and potential sabotage of design projects. The ability to execute arbitrary code elevates the risk to system integrity, potentially allowing attackers to install malware or pivot within the network. Given the local attack vector and requirement for user interaction, insider threats or targeted phishing campaigns could facilitate exploitation. The confidentiality breach could have regulatory implications under GDPR if personal or sensitive data is exposed. Additionally, disruption of design workflows could result in financial losses and reputational damage. The impact is heightened in countries with dense industrial bases and advanced manufacturing sectors, where Autodesk Fusion usage is prevalent.

Mitigation Recommendations

1. Immediately restrict the ability to input or modify component descriptions to trusted users only, minimizing the risk of malicious payload injection. 2. Implement input validation and sanitization on all fields accepting HTML or rich text content within Autodesk Fusion to prevent script injection. 3. Apply application-level sandboxing or use operating system-level containment features to limit the privileges of the Fusion process, reducing the impact of potential code execution. 4. Monitor logs and user activity for unusual interactions with component descriptions or unexpected script execution behaviors. 5. Educate users to avoid clicking on suspicious or unverified component descriptions, especially those received from untrusted sources. 6. Coordinate with Autodesk for timely patch deployment once available, and subscribe to official security advisories for updates. 7. Employ endpoint detection and response (EDR) tools to detect anomalous behaviors indicative of exploitation attempts. 8. Consider network segmentation to isolate systems running Autodesk Fusion from critical infrastructure to limit lateral movement in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
autodesk
Date Reserved
2025-12-19T18:57:21.548Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69725c7b4623b1157c8074a4

Added to database: 1/22/2026, 5:20:59 PM

Last enriched: 1/31/2026, 8:09:40 AM

Last updated: 2/6/2026, 2:40:10 PM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats