Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25951: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in frangoteam FUXA

0
High
VulnerabilityCVE-2026-25951cvecve-2026-25951cwe-22cwe-23cwe-184
Published: Mon Feb 09 2026 (02/09/2026, 22:24:25 UTC)
Source: CVE Database V5
Vendor/Project: frangoteam
Product: FUXA

Description

FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. Prior to 1.2.11, there is a flaw in the path sanitization logic allows an authenticated attacker with administrative privileges to bypass directory traversal protections. By using nested traversal sequences (e.g., ....//), an attacker can write arbitrary files to the server filesystem, including sensitive directories like runtime/scripts. This leads to Remote Code Execution (RCE) when the server reloads the malicious scripts. This vulnerability is fixed in 1.2.11.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/17/2026, 09:18:18 UTC

Technical Analysis

CVE-2026-25951 is a path traversal vulnerability identified in frangoteam's FUXA software, a web-based process visualization tool commonly used in SCADA, HMI, and dashboard environments. The flaw exists in the path sanitization logic prior to version 1.2.11, where nested traversal sequences such as '....//' are not properly normalized or filtered. This allows an authenticated attacker with administrative privileges to bypass directory restrictions and write arbitrary files to the server filesystem, including sensitive directories like 'runtime/scripts'. By placing malicious scripts in these directories, the attacker can trigger remote code execution (RCE) when the server reloads or executes these scripts. The vulnerability does not require user interaction and can be exploited remotely over the network, but it does require administrative-level authentication, which limits the attack surface to insiders or compromised admin accounts. The CVSS 4.0 base score is 8.6, reflecting high impact on confidentiality, integrity, and availability due to the potential for full system compromise. The vulnerability is fixed in FUXA version 1.2.11. No public exploits or active exploitation campaigns have been reported to date. This vulnerability is particularly critical in industrial control system environments where FUXA is deployed, as it can lead to operational disruption and safety risks.

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially those operating critical infrastructure, manufacturing plants, or utilities that rely on FUXA for process visualization and control. Successful exploitation could allow attackers to execute arbitrary code on SCADA/HMI servers, potentially disrupting industrial processes, causing downtime, or manipulating operational data. This could lead to safety hazards, financial losses, and regulatory non-compliance under frameworks like NIS2 and GDPR if sensitive data or operational integrity is compromised. The requirement for administrative privileges means the threat is heightened by insider threats or credential compromise. Given the critical role of SCADA systems in sectors such as energy, transportation, and manufacturing, the vulnerability poses a substantial risk to operational technology security and business continuity in Europe.

Mitigation Recommendations

1. Immediately upgrade all FUXA installations to version 1.2.11 or later to apply the official patch addressing the path traversal flaw. 2. Restrict administrative access to FUXA interfaces using network segmentation, VPNs, or zero-trust principles to minimize exposure. 3. Implement strong multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 4. Conduct regular audits of user privileges and remove unnecessary administrative rights. 5. Monitor server filesystem changes, especially in sensitive directories like 'runtime/scripts', using file integrity monitoring tools to detect unauthorized modifications. 6. Employ application-layer firewalls or web application firewalls (WAFs) with custom rules to detect and block suspicious path traversal patterns. 7. Maintain comprehensive logging and alerting on administrative actions and anomalous file writes. 8. Develop and test incident response plans specific to SCADA/HMI compromises to ensure rapid containment and recovery.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T17:13:54.065Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698a63b84b57a58fa17688df

Added to database: 2/9/2026, 10:46:16 PM

Last enriched: 2/17/2026, 9:18:18 AM

Last updated: 3/27/2026, 4:21:04 AM

Views: 137

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses