Autodesk Fusion XSS Flaw Lets Attackers Steal Local Files
A critical Stored Cross-Site Scripting (XSS) vulnerability has been identified in Autodesk Fusion desktop application, as reported by the National Vulnerability Database. The flaw, tracked as CVE-2026-4344, allows a remote attacker to execute code or read local files by tricking a user into clicking a maliciously crafted HTML payload within a component name. This payload, when displayed during a delete confirmation dialog, triggers the vulnerability.
The National Vulnerability Database rates this flaw with a CVSS score of 7.1 (HIGH). While the specific affected products are not detailed, the vulnerability stems from improper handling of HTML input in component names, leading to CWE-79 (Improper Neutralization of Input During Web Page Generation). This is a classic example of how seemingly minor UI elements can become vectors for serious attacks if not properly sanitized.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 5 SIEM formats3 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Drive-by Download via Browser — CVE-2026-4344
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
3 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-4344 | XSS | Autodesk Fusion desktop application |
| CVE-2026-4344 | XSS | Stored Cross-site Scripting (XSS) in component name displayed during delete confirmation dialog |
| CVE-2026-4344 | RCE | Arbitrary code execution in the context of the current process |
| CVE-2026-4344 | Information Disclosure | Read local files |