Home

Description

A maliciously crafted HTML payload in a design name, when displayed during the delete confirmation dialog and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process.

PUBLISHED Reserved 2025-12-19 | Published 2026-01-22 | Updated 2026-01-23 | Assigner autodesk




HIGH: 7.1CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N

Problem types

CWE-79 Cross-Site Scripting (XSS) - Stored

Product status

Default status
unaffected

2603.0 (custom) before 2606.1.22
affected

References

dl.appstreaming.autodesk.com/...Fusion Client Downloader.exe patch

dl.appstreaming.autodesk.com/...Fusion Client Downloader.dmg patch

www.autodesk.com/trust/security-advisories/adsk-sa-2026-0001 vendor-advisory

cve.org (CVE-2026-0533)

nvd.nist.gov (CVE-2026-0533)

Download JSON