A maliciously crafted HTML payload, stored in a component’s description and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 22 Jan 2026 23:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A maliciously crafted HTML payload, stored in a component’s description and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process. | |
| Title | Stored XSS in Electronic Library Component Description | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: autodesk
Published:
Updated: 2026-01-22T18:24:52.607Z
Reserved: 2025-12-19T18:57:21.548Z
Link: CVE-2026-0535
Updated: 2026-01-22T18:24:45.533Z
Status : Received
Published: 2026-01-22T17:16:30.260
Modified: 2026-01-22T17:16:30.260
Link: CVE-2026-0535
No data.
OpenCVE Enrichment
No data.
Weaknesses