CVE-2026-0535

7.1 HIGH

📋 TL;DR

A stored cross-site scripting vulnerability in Autodesk Fusion allows attackers to inject malicious HTML into component descriptions. When users click the crafted payload, it can execute arbitrary JavaScript in the application context, potentially leading to local file access or code execution. This affects all Autodesk Fusion desktop application users who view or interact with component descriptions.

💻 Affected Systems

Products:
  • Autodesk Fusion
Versions: All versions prior to the security update
Operating Systems: Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the desktop application's component description handling. Both Windows (.exe) and macOS (.dmg) installers are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious actor gains full control of the user's system through arbitrary code execution, leading to data theft, ransomware deployment, or complete system compromise.

🟠

Likely Case

Attackers steal sensitive local files, session tokens, or credentials through JavaScript execution in the application context.

🟢

If Mitigated

With proper input validation and output encoding, the payload would be rendered harmless as plain text rather than executable code.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to have ability to create or modify component descriptions, and a user must click the malicious payload. The stored nature makes this more dangerous than reflected XSS.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version specified in Autodesk Security Advisory ADSK-SA-2026-0001

Vendor Advisory: https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0001

Restart Required: Yes

Instructions:

1. Open Autodesk Fusion. 2. Go to Help > Check for Updates. 3. Install the latest available update. 4. Restart the application. 5. Verify the version matches the patched version in the security advisory.

🔧 Temporary Workarounds

Disable component description editing

all

Restrict user permissions to prevent modification of component descriptions where possible

User awareness training

all

Train users to avoid clicking suspicious links or content in component descriptions

🧯 If You Can't Patch

  • Implement network segmentation to isolate Autodesk Fusion systems from critical assets
  • Deploy application control solutions to prevent unauthorized code execution from the application

🔍 How to Verify

Check if Vulnerable:

Check if your Autodesk Fusion version is older than the patched version mentioned in ADSK-SA-2026-0001

Check Version:

In Autodesk Fusion: Help > About Fusion 360

Verify Fix Applied:

Verify the application version matches or exceeds the patched version in the security advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual component description modifications
  • Multiple failed description update attempts
  • Unexpected application crashes after viewing components

Network Indicators:

  • Outbound connections from Autodesk Fusion to unexpected domains
  • File transfer patterns from local directories

SIEM Query:

process:autodesk* AND (event:file_read OR event:network_connection) AND NOT destination:autodesk.com

🔗 References

📤 Share & Export