FUXA 1.2.9 Unauthenticated Remote Code Execution
A remote code execution (RCE) vulnerability exists in FUXA version 1.2.9 and earlier due to an unauthenticated path traversal issue in the /api/upload endpoint, allowing attackers to write arbitrary files and execute code.
FUXA version 1.2.9 and earlier is vulnerable to an unauthenticated remote code execution (RCE) vulnerability, tracked as CVE-2026-25895. The vulnerability stems from a path traversal flaw in the /api/upload endpoint, which lacks proper authentication and input validation. An attacker can exploit this vulnerability to write arbitrary files to the server, potentially leading to code execution. Publicly available exploit code (EDB-52568) increases the risk to unpatched FUXA instances. The vulnerability exists because the /api/upload route is registered without authentication middleware. The destination parameter in the JSON body is concatenated into a file path without sufficient sanitization, allowing directory traversal.
Attack Chain
- The attacker sends a POST request to the
/api/uploadendpoint without any authentication. - The request body includes a JSON payload with a
destinationfield containing a path traversal sequence (e.g.,a/../../../../<target>). - The
filenamefield in the JSON payload specifies the name of the file to be written. - The
resource.datafield contains the base64-encoded content of the file to be written. - The server concatenates the
destinationvalue with the application directory path without proper sanitization usingpath.resolve(). - The server writes the file specified by
filenameto the attacker-controlled path usingfs.writeFileSync(). - The attacker writes a malicious file (e.g., a JavaScript file containing code to execute commands) to a known location on the server.
- If the uploaded file is a settings.js file, the attacker can achieve RCE on the next application startup by overwriting the existing settings.js file with a malicious one containing Javascript code that executes commands upon loading.
Impact
Successful exploitation of this vulnerability allows an unauthenticated attacker to execute arbitrary code on the FUXA server. This can lead to complete system compromise, data theft, or denial of service. The availability of public exploit code significantly increases the likelihood of exploitation. The target application is running on Ubuntu Server.
Recommendation
- Apply the patch to upgrade FUXA to version 1.2.10 or later to address CVE-2026-25895.
- Deploy the Sigma rule “Detect CVE-2026-25895 Exploitation — FUXA Unauthenticated Path Traversal” to detect exploitation attempts.
- Monitor web server logs for POST requests to
/api/uploadwith suspicious path traversal sequences in thecs-uri-queryorcs-uri-stemfields, as described in the Sigma rule and the overview. - Implement input validation and sanitization on the
/api/uploadendpoint to prevent path traversal attacks. - Enforce authentication and authorization controls on the
/api/uploadendpoint to restrict access to authorized users only.
Detection coverage 2
Detect CVE-2026-25895 Exploitation — FUXA Unauthenticated Path Traversal
criticalDetects CVE-2026-25895 exploitation — HTTP POST to /api/upload with path traversal sequences in the destination parameter, indicating a path traversal attempt.
Detect CVE-2026-25895 Exploitation - FUXA Settings.js Overwrite
highDetects CVE-2026-25895 exploitation - Detects the creation or modification of settings.js with suspicious content in FUXA
Detection queries are available on the platform. Get full rules →