{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-25894","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-02-06T21:08:39.130Z","datePublished":"2026-02-09T22:28:46.316Z","dateUpdated":"2026-02-11T21:25:17.858Z"},"containers":{"cna":{"title":"FUXA Unauthenticated Remote Code Execution via Hardcoded JWT Secret in Default Configuration","problemTypes":[{"descriptions":[{"cweId":"CWE-321","lang":"en","description":"CWE-321: Use of Hard-coded Cryptographic Key","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-1188","lang":"en","description":"CWE-1188: Insecure Default Initialization of Resource","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"HIGH","attackRequirements":"PRESENT","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","baseScore":9.5,"baseSeverity":"CRITICAL","vectorString":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0"}}],"references":[{"name":"https://github.com/frangoteam/FUXA/security/advisories/GHSA-32cc-x95p-fxcg","tags":["x_refsource_CONFIRM"],"url":"https://github.com/frangoteam/FUXA/security/advisories/GHSA-32cc-x95p-fxcg"},{"name":"https://github.com/frangoteam/FUXA/commit/ea7b3df066f9fdef8ecdce318398ae40546bc50d","tags":["x_refsource_MISC"],"url":"https://github.com/frangoteam/FUXA/commit/ea7b3df066f9fdef8ecdce318398ae40546bc50d"},{"name":"https://github.com/frangoteam/FUXA/releases/tag/v1.2.10","tags":["x_refsource_MISC"],"url":"https://github.com/frangoteam/FUXA/releases/tag/v1.2.10"}],"affected":[{"vendor":"frangoteam","product":"FUXA","versions":[{"version":"< 1.2.10","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-02-09T22:28:46.316Z"},"descriptions":[{"lang":"en","value":"FUXA is a web-based Process Visualization (SCADA/HMI/Dashboard) software. An insecure default configuration in FUXA allows an unauthenticated, remote attacker to gain administrative access and execute arbitrary code on the server. This affects FUXA through version 1.2.9 when authentication is enabled, but the administrator JWT secret is not configured. This issue has been patched in FUXA version 1.2.10."}],"source":{"advisory":"GHSA-32cc-x95p-fxcg","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-11T21:25:11.880678Z","id":"CVE-2026-25894","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-11T21:25:17.858Z"}}]}}