Skip to content
Threat Feed
high advisory

Autodesk Fusion Stored XSS Vulnerability (CVE-2026-4344)

CVE-2026-4344 is a stored cross-site scripting (XSS) vulnerability in the Autodesk Fusion desktop application where a malicious HTML payload in a component name, when displayed during the delete confirmation dialog and clicked by a user, can lead to arbitrary code execution.

A stored cross-site scripting (XSS) vulnerability, identified as CVE-2026-4344, affects the Autodesk Fusion desktop application. The vulnerability occurs due to insufficient sanitization of component names. A malicious actor can inject a crafted HTML payload into a component’s name. When a user attempts to delete the component, the malicious payload is displayed within the delete confirmation dialog. If the user interacts with the crafted HTML, the XSS vulnerability is triggered, potentially leading to local file reads or arbitrary code execution within the context of the Autodesk Fusion process. This vulnerability poses a significant risk as it could allow attackers to compromise a user’s system through a seemingly benign action within the application.

Attack Chain

  1. The attacker crafts a malicious HTML payload.
  2. The attacker injects the crafted HTML payload into a component name within Autodesk Fusion.
  3. A user attempts to delete the component with the malicious name.
  4. The Autodesk Fusion application displays a delete confirmation dialog containing the malicious HTML payload.
  5. The user clicks or interacts with the malicious HTML payload within the delete confirmation dialog.
  6. The XSS vulnerability is triggered, allowing the attacker to execute arbitrary JavaScript code.
  7. The attacker uses the XSS vulnerability to read local files or execute arbitrary code within the context of the Autodesk Fusion process.
  8. The attacker gains unauthorized access or control over the user’s system.

Impact

Successful exploitation of CVE-2026-4344 allows a malicious actor to execute arbitrary code within the context of the Autodesk Fusion application. This could lead to the attacker reading local files, modifying sensitive data, or even gaining complete control over the user’s system. Due to the widespread use of Autodesk Fusion in engineering and design sectors, this vulnerability could potentially impact a large number of users and organizations.

Recommendation

  • Monitor process creations originating from the Autodesk Fusion process (process_creation, product: windows/macos) for suspicious command-line arguments that may indicate exploitation.
  • Inspect Autodesk Fusion application logs (if available) for events related to component deletion and HTML rendering, searching for unusual or potentially malicious HTML tags (webserver, product: linux/windows).
  • Block the download URLs for Autodesk Fusion installers (iocs, type: url) at the network level to prevent attackers from distributing malicious versions of the software.

Detection coverage 2

Detect Process Creation from Autodesk Fusion with Suspicious Arguments

high

Detects suspicious process creation originating from the Autodesk Fusion application that could indicate exploitation of CVE-2026-4344.

sigma tactics: execution techniques: T1059.001, T1068 sources: process_creation, windows

Detect Autodesk Fusion Executing PowerShell with Obfuscated Commands

high

Detects PowerShell execution from Autodesk Fusion with obfuscated commands.

sigma tactics: execution techniques: T1059.001 sources: process_creation, windows

Detection queries are kept inside the platform. Get full rules →

Indicators of compromise

3

url

TypeValue
urlhttps://dl.appstreaming.autodesk.com/production/installers/Fusion%20Client%20Downloader.dmg
urlhttps://dl.appstreaming.autodesk.com/production/installers/Fusion%20Client%20Downloader.exe
urlhttps://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0005