FKIE_CVE-2025-69985
Vulnerability from fkie_nvd - Published: 2026-02-24 16:24 - Updated: 2026-02-26 19:39
Severity ?
Summary
FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP "Referer" header to validate internal requests. A remote unauthenticated attacker can bypass JWT authentication by spoofing the Referer header to match the server's host. Successful exploitation allows the attacker to access the protected /api/runscript endpoint and execute arbitrary Node.js code on the server.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://gist.github.com/lihy10/8cb2dd65ebf1385f12a7e00e25a50d40 | Exploit, Third Party Advisory | |
| cve@mitre.org | https://github.com/frangoteam/FUXA/blob/master/server/api/jwt-helper.js | Product |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| frangoteam | fuxa | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:frangoteam:fuxa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A28BFAD0-FB57-413C-9090-E25A536BCDF4",
"versionEndIncluding": "1.2.8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP \"Referer\" header to validate internal requests. A remote unauthenticated attacker can bypass JWT authentication by spoofing the Referer header to match the server\u0027s host. Successful exploitation allows the attacker to access the protected /api/runscript endpoint and execute arbitrary Node.js code on the server."
},
{
"lang": "es",
"value": "FUXA 1.2.8 y versiones anteriores contiene una vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n que conduce a la ejecuci\u00f3n remota de c\u00f3digo (RCE). La vulnerabilidad existe en el middleware server/api/jwt-helper.js, que conf\u00eda indebidamente en el encabezado HTTP \u0027Referer\u0027 para validar solicitudes internas. Un atacante remoto no autenticado puede omitir la autenticaci\u00f3n JWT suplantando el encabezado Referer para que coincida con el host del servidor. Si se explota con \u00e9xito un atacante podr\u00e1 acceder al endpoint protegido /api/runscript y ejecutar c\u00f3digo Node.js arbitrario en el servidor."
}
],
"id": "CVE-2025-69985",
"lastModified": "2026-02-26T19:39:20.677",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-02-24T16:24:07.120",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/lihy10/8cb2dd65ebf1385f12a7e00e25a50d40"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/frangoteam/FUXA/blob/master/server/api/jwt-helper.js"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-288"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…