CVE-2026-4345
Stored XSS in Autodesk Fusion Design Name Export Enables Code Execution
Publication date: 2026-04-14
Last updated on: 2026-04-22
Assigner: Autodesk
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| autodesk | fusion | to 2702.1.47 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Stored Cross-site Scripting (XSS) issue in the Autodesk Fusion desktop application. It occurs when a maliciously crafted HTML payload is stored in a design name and then exported to a CSV file. When triggered, this payload can execute within the context of the application.
A malicious actor can exploit this vulnerability to read local files or execute arbitrary code with the privileges of the current process running Autodesk Fusion.
How can this vulnerability impact me? :
Exploitation of this vulnerability can lead to unauthorized access to local files and execution of arbitrary code on the affected system. This can compromise the confidentiality and integrity of data and potentially allow an attacker to take control of the application or system processes.