An authentication bypass vulnerability in FUXA allows an unauthenticated, remote attacker to gain administrative access and execute arbitrary code on the server. This affects FUXA through version 1.2.9 when authentication is enabled. This issue has been patched in FUXA version 1.2.10.
Affected deployments are those with runtime.settings.secureEnabled set to true.
Exploitation allows an unauthenticated, remote attacker to bypass all authentication mechanisms and obtain administrative access to the FUXA instance by minting administrator JWTs via the heartbeat refresh endpoint. With these elevated privileges, the attacker can interact with administrative APIs, including intended features designed for automation and scripting, to execute arbitrary code in the context of the FUXA service. Depending on deployment configuration and permissions, this may lead to full system compromise and could further expose connected ICS/SCADA environments to follow-on actions.
This issue has been patched in FUXA version 1.2.10. Users are strongly encouraged to update to the latest available release.
{
"cwe_ids": [
"CWE-285",
"CWE-287"
],
"github_reviewed_at": "2026-02-05T00:27:53Z",
"nvd_published_at": null,
"severity": "CRITICAL",
"github_reviewed": true
}