Autodesk Fusion XSS Flaw Puts Local Files, Code at Risk
The National Vulnerability Database (NVD) has documented a high-severity Stored Cross-site Scripting (XSS) vulnerability, identified as CVE-2026-4345, affecting the Autodesk Fusion desktop application. This isn’t just a simple client-side annoyance; a maliciously crafted HTML payload, when stored in a design name and subsequently exported to CSV, can trigger this nasty flaw.
According to the NVD, the impact is significant. A threat actor could leverage this vulnerability to read local files on an affected system or even execute arbitrary code. The CVSS score of 7.1 (HIGH) reflects the potential for serious damage, especially given the ‘High’ confidentiality and integrity impacts noted in the CVSS vector. While specific affected product versions weren’t detailed by the NVD, the underlying issue is categorized under CWE-79, a well-known weakness for improper neutralization of input during web page generation, commonly leading to XSS.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 5 SIEM formats3 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Click on Phishing Link from CVE-2026-4345 Domain
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
3 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-4345 | XSS | Autodesk Fusion desktop application |
| CVE-2026-4345 | XSS | Stored Cross-site Scripting (XSS) |
| CVE-2026-4345 | XSS | Maliciously crafted HTML payload in design name, exported to CSV |
| CVE-2026-4345 | RCE | Execute arbitrary code in the context of the current process |
| CVE-2026-4345 | Information Disclosure | Read local files |