Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25895: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in frangoteam FUXA

0
Critical
VulnerabilityCVE-2026-25895cvecve-2026-25895cwe-22cwe-306
Published: Mon Feb 09 2026 (02/09/2026, 22:29:48 UTC)
Source: CVE Database V5
Vendor/Project: frangoteam
Product: FUXA

Description

CVE-2026-25895 is a critical path traversal vulnerability in frangoteam's FUXA, a web-based SCADA/HMI/dashboard software. It allows unauthenticated remote attackers to write arbitrary files to any location on the server filesystem in versions prior to 1. 2. 10. Exploitation requires no user interaction or privileges, making it highly accessible. The vulnerability can severely impact confidentiality, integrity, and availability by enabling attackers to deploy malicious files, potentially leading to full system compromise. Although no known exploits are currently reported in the wild, the high CVSS score (9. 5) underscores the urgency of patching. European organizations using FUXA in critical infrastructure or industrial control systems are at significant risk. Immediate upgrading to version 1.

AI-Powered Analysis

AILast updated: 02/09/2026, 23:01:12 UTC

Technical Analysis

CVE-2026-25895 is a critical security vulnerability identified in frangoteam's FUXA software, a web-based process visualization tool commonly used in SCADA, HMI, and dashboard environments. The vulnerability is classified under CWE-22 (Improper Limitation of a Pathname to a Restricted Directory) and CWE-306 (Missing Authentication for Critical Function). It allows an unauthenticated remote attacker to perform path traversal attacks, enabling arbitrary file write operations anywhere on the server's filesystem. This is particularly dangerous because it bypasses authentication and requires no user interaction, significantly lowering the barrier to exploitation. The flaw affects all FUXA versions prior to 1.2.10, which has addressed the issue. The CVSS 4.0 score of 9.5 reflects the vulnerability's criticality, with high impact on confidentiality, integrity, and availability, and an attack vector that is network-based with no privileges required. Exploiting this vulnerability could allow attackers to plant malicious scripts, modify configuration files, or disrupt system operations, potentially leading to full system compromise or disruption of industrial processes. Although no active exploits have been reported in the wild, the nature of the vulnerability and the critical systems FUXA supports make it a high-risk issue. The vulnerability's presence in SCADA/HMI software increases its potential impact on industrial and critical infrastructure sectors, especially in regions with significant industrial automation deployments.

Potential Impact

The impact of CVE-2026-25895 on European organizations is substantial, especially those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors that rely on FUXA for process visualization and control. Successful exploitation can lead to unauthorized file writes, enabling attackers to deploy malware, alter system configurations, or disrupt operations, potentially causing downtime, safety hazards, or data breaches. The compromise of SCADA/HMI systems can have cascading effects on operational technology environments, affecting physical processes and safety. Given the unauthenticated nature of the exploit, attackers can gain initial access without credentials, increasing the risk of widespread exploitation. European organizations face regulatory and compliance risks, including potential violations of NIS2 Directive requirements for cybersecurity in critical infrastructure. The threat is particularly acute for organizations with internet-facing FUXA instances or insufficient network segmentation, increasing exposure to remote attacks.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade all FUXA installations to version 1.2.10 or later, which contains the official patch. In addition, organizations should implement strict network segmentation to isolate SCADA/HMI systems from general IT networks and the internet, reducing exposure to remote attacks. Deploy web application firewalls (WAFs) with custom rules to detect and block path traversal attempts targeting FUXA endpoints. Conduct thorough audits of existing FUXA deployments to identify any unauthorized file changes or suspicious activity. Employ strict access controls and monitoring on servers hosting FUXA, including file integrity monitoring to detect unauthorized modifications. Disable or restrict unnecessary services and interfaces on FUXA servers to minimize attack surface. Regularly update and patch all related software components and maintain an incident response plan tailored to industrial control system environments. Finally, raise awareness among operational technology and IT security teams about this vulnerability and its potential impact.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-06T21:08:39.130Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698a63b84b57a58fa17688da

Added to database: 2/9/2026, 10:46:16 PM

Last enriched: 2/9/2026, 11:01:12 PM

Last updated: 2/9/2026, 11:57:00 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats