FUXA Faux Pas: From Weak Regex to SCADA RCE
Vulnerability ID: CVE-2026-25951
CVSS Score: 8.6
Published: 2026-02-10
A critical path traversal vulnerability in the FUXA SCADA/HMI web interface allows authenticated administrators to escape the filesystem sandbox using nested directory sequences. Because FUXA dynamically reloads scripts found in its runtime directory, this filesystem write primitive automatically escalates to Remote Code Execution (RCE), potentially giving attackers control over industrial control systems.
TL;DR
FUXA tried to stop directory traversal by deleting '../' strings, but they only did it once. By sending '....//', attackers can bypass the filter, write a malicious JavaScript file to the auto-loading 'runtime/scripts' folder, and achieve immediate RCE on the SCADA server.
⚠️ Exploit Status: POC
Technical Details
- CWE ID: CWE-22 (Path Traversal)
- CVSS v4.0: 8.6 (High)
- Attack Vector: Network
- Privileges Required: High (Admin)
- Impact: Remote Code Execution (RCE)
- Status: Patched (v1.2.11)
Affected Systems
- FUXA SCADA/HMI Web Server
-
FUXA: < 1.2.11 (Fixed in:
1.2.11)
Code Analysis
Commit: f7a9f04
Refactored path validation logic to use path.resolve and path.relative instead of regex replacement.
const resolvedBase = path.resolve(baseDir);
const resolvedTarget = path.resolve(resolvedBase, normalized);
const relative = path.relative(resolvedBase, resolvedTarget);
Exploit Details
- GitHub Security Advisory: Detailed analysis of the nested traversal payload and RCE vector.
Mitigation Strategies
- Input Validation: Use canonicalization rather than blacklisting.
- Network Segmentation: Isolate SCADA systems from public networks.
- Least Privilege: Run the FUXA process with minimal filesystem permissions.
Remediation Steps:
- Identify vulnerable FUXA instances (versions < 1.2.11).
- Backup project data and configuration.
- Update to FUXA v1.2.11 or later immediately.
- Verify the integrity of the 'runtime/scripts' directory.
References
Read the full report for CVE-2026-25951 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)