FUXA 1.2.8 Authentication Bypass and Remote Command Execution Vulnerability
FUXA 1.2.8 and earlier is vulnerable to an authentication bypass vulnerability (CVE-2025-69985) that allows remote command execution by exploiting the /api/runscript endpoint with a crafted JavaScript payload.
FUXA, a web-based SCADA/HMI software, versions 1.2.8 and earlier, contains an authentication bypass vulnerability (CVE-2025-69985). This vulnerability allows unauthenticated attackers to execute arbitrary commands on the server by exploiting the /api/runscript endpoint. The exploit uses a crafted JavaScript payload leveraging child_process.execSync to execute commands, capturing the full standard output. This vulnerability was discovered and published in February 2026 by Joshua van der Poll, and a proof-of-concept exploit is publicly available. Successful exploitation leads to complete system compromise, emphasizing the critical need for patching and detection measures. The vulnerability has been patched in versions of FUXA greater than 1.2.8.
Attack Chain
- An unauthenticated attacker sends a POST request to
/api/runscript. - The attacker crafts a JSON payload containing a
scriptparameter with malicious JavaScript code. - The JavaScript code utilizes the
child_process.execSyncfunction to execute arbitrary commands on the system. - The
execSyncfunction captures the standard output and standard error of the executed command. - The captured output is returned in the HTTP response.
- The attacker parses the HTTP response to retrieve the output of the executed command.
- The attacker can then use the command execution to perform further actions, such as reading sensitive files, installing malware, or creating new user accounts.
- The attacker achieves full remote command execution, potentially leading to complete system compromise.
Impact
Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary commands on the FUXA server. This can lead to complete system compromise, including data theft, service disruption, and the installation of malware. Given the nature of SCADA/HMI software, this could have significant consequences for industrial control systems and critical infrastructure. While specific victim numbers are unavailable, the potential impact is high due to the critical nature of the targeted software.
Recommendation
- Upgrade FUXA to a version greater than 1.2.8 to patch CVE-2025-69985.
- Deploy the Sigma rule “Detect FUXA API Runscript Exploitation” to your SIEM to identify exploitation attempts against the
/api/runscriptendpoint. - Monitor web server logs for POST requests to
/api/runscriptwith unusual or suspicious JavaScript code in thescriptparameter, as detected by the rule “Detect Suspicious Javascript in FUXA API Runscript”. - Implement network segmentation to limit the blast radius of a potential compromise, isolating FUXA servers from other critical systems.
Detection coverage 2
Detect FUXA API Runscript Exploitation
criticalDetects requests to the /api/runscript endpoint in FUXA, which is vulnerable to authentication bypass and RCE (CVE-2025-69985)
Detect Suspicious Javascript in FUXA API Runscript
highDetects suspicious JavaScript code within requests to the /api/runscript endpoint, indicative of RCE attempts.
Detection queries are available on the platform. Get full rules →