CVE-2026-25951: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in frangoteam FUXA
CVE-2026-25951 is a high-severity path traversal vulnerability in frangoteam's FUXA web-based SCADA/HMI software versions prior to 1. 2. 11. An authenticated attacker with administrative privileges can exploit improper path sanitization by using nested traversal sequences to write arbitrary files, including malicious scripts, to sensitive server directories. This leads to remote code execution when the server reloads these scripts. The vulnerability requires high privileges but no user interaction and has a CVSS 4. 0 score of 8. 6. It is fixed in version 1. 2.
AI Analysis
Technical Summary
CVE-2026-25951 is a path traversal vulnerability affecting frangoteam's FUXA software, a web-based process visualization tool commonly used in SCADA, HMI, and dashboard applications. The flaw exists in the path sanitization logic prior to version 1.2.11, where nested traversal sequences such as '....//' bypass directory restrictions. An attacker with authenticated administrative privileges can exploit this to write arbitrary files to the server filesystem, including critical directories like runtime/scripts. By placing malicious scripts in these directories, the attacker achieves remote code execution (RCE) when the server reloads these scripts, potentially gaining full control over the affected system. The vulnerability does not require user interaction and has a low attack complexity, but it does require administrative privileges, limiting exploitation to insiders or compromised admin accounts. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the potential for severe operational disruption in industrial environments is significant. The issue is resolved in FUXA version 1.2.11, which corrects the path sanitization logic to prevent traversal bypasses.
Potential Impact
For European organizations, especially those operating critical infrastructure, manufacturing, or industrial control systems using FUXA, this vulnerability poses a significant risk. Successful exploitation can lead to remote code execution, allowing attackers to manipulate process visualization data, disrupt operations, or pivot to other network segments. The compromise of SCADA/HMI systems can result in operational downtime, safety hazards, data breaches, and loss of control over industrial processes. Given the high integration of industrial automation in European manufacturing and energy sectors, the impact could extend to economic losses and potential safety incidents. Additionally, the requirement for administrative privileges means insider threats or compromised admin credentials are primary risk vectors, emphasizing the need for strict access controls. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediately upgrade all FUXA installations to version 1.2.11 or later to apply the official patch that fixes the path traversal flaw. 2. Restrict administrative access to FUXA systems using strong authentication mechanisms such as multi-factor authentication (MFA) and enforce least privilege principles. 3. Conduct thorough audits of existing administrative accounts and revoke or monitor any unnecessary or suspicious privileges. 4. Implement network segmentation to isolate FUXA servers from less trusted network zones, reducing exposure to compromised accounts. 5. Monitor server filesystem changes, especially in sensitive directories like runtime/scripts, for unauthorized file writes or modifications. 6. Employ application-layer firewalls or web application firewalls (WAFs) with rules to detect and block suspicious path traversal patterns. 7. Regularly review and update incident response plans to include scenarios involving SCADA/HMI compromise. 8. Educate administrators on the risks of this vulnerability and the importance of credential security to prevent insider exploitation.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Sweden
CVE-2026-25951: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in frangoteam FUXA
Description
CVE-2026-25951 is a high-severity path traversal vulnerability in frangoteam's FUXA web-based SCADA/HMI software versions prior to 1. 2. 11. An authenticated attacker with administrative privileges can exploit improper path sanitization by using nested traversal sequences to write arbitrary files, including malicious scripts, to sensitive server directories. This leads to remote code execution when the server reloads these scripts. The vulnerability requires high privileges but no user interaction and has a CVSS 4. 0 score of 8. 6. It is fixed in version 1. 2.
AI-Powered Analysis
Technical Analysis
CVE-2026-25951 is a path traversal vulnerability affecting frangoteam's FUXA software, a web-based process visualization tool commonly used in SCADA, HMI, and dashboard applications. The flaw exists in the path sanitization logic prior to version 1.2.11, where nested traversal sequences such as '....//' bypass directory restrictions. An attacker with authenticated administrative privileges can exploit this to write arbitrary files to the server filesystem, including critical directories like runtime/scripts. By placing malicious scripts in these directories, the attacker achieves remote code execution (RCE) when the server reloads these scripts, potentially gaining full control over the affected system. The vulnerability does not require user interaction and has a low attack complexity, but it does require administrative privileges, limiting exploitation to insiders or compromised admin accounts. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are reported in the wild yet, the potential for severe operational disruption in industrial environments is significant. The issue is resolved in FUXA version 1.2.11, which corrects the path sanitization logic to prevent traversal bypasses.
Potential Impact
For European organizations, especially those operating critical infrastructure, manufacturing, or industrial control systems using FUXA, this vulnerability poses a significant risk. Successful exploitation can lead to remote code execution, allowing attackers to manipulate process visualization data, disrupt operations, or pivot to other network segments. The compromise of SCADA/HMI systems can result in operational downtime, safety hazards, data breaches, and loss of control over industrial processes. Given the high integration of industrial automation in European manufacturing and energy sectors, the impact could extend to economic losses and potential safety incidents. Additionally, the requirement for administrative privileges means insider threats or compromised admin credentials are primary risk vectors, emphasizing the need for strict access controls. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediately upgrade all FUXA installations to version 1.2.11 or later to apply the official patch that fixes the path traversal flaw. 2. Restrict administrative access to FUXA systems using strong authentication mechanisms such as multi-factor authentication (MFA) and enforce least privilege principles. 3. Conduct thorough audits of existing administrative accounts and revoke or monitor any unnecessary or suspicious privileges. 4. Implement network segmentation to isolate FUXA servers from less trusted network zones, reducing exposure to compromised accounts. 5. Monitor server filesystem changes, especially in sensitive directories like runtime/scripts, for unauthorized file writes or modifications. 6. Employ application-layer firewalls or web application firewalls (WAFs) with rules to detect and block suspicious path traversal patterns. 7. Regularly review and update incident response plans to include scenarios involving SCADA/HMI compromise. 8. Educate administrators on the risks of this vulnerability and the importance of credential security to prevent insider exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-09T17:13:54.065Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 698a63b84b57a58fa17688df
Added to database: 2/9/2026, 10:46:16 PM
Last enriched: 2/9/2026, 11:00:52 PM
Last updated: 2/10/2026, 12:00:27 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0845: CWE-862 Missing Authorization in wclovers WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible
HighCVE-2025-15147: CWE-639 Authorization Bypass Through User-Controlled Key in wclovers WCFM Membership – WooCommerce Memberships for Multivendor Marketplace
MediumCVE-2025-15314: Improper Link Resolution Before File Access ('Link Following') in Tanium end-user-cx
MediumCVE-2025-15313: Improper Link Resolution Before File Access ('Link Following') in Tanium Tanium EUSS
MediumCVE-2025-15310: Improper Link Resolution Before File Access ('Link Following') in Tanium Patch Endpoint Tools
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.