Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. @frangoteam/fuxa
  4. ›
  5. CVE-2025-69985

CVE-2025-69985: FUXA has JWT Authentication Bypass via HTTP Referer header spoofing

February 24, 2026 (updated February 26, 2026)

FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP “Referer” header to validate internal requests. A remote unauthenticated attacker can bypass JWT authentication by spoofing the Referer header to match the server’s host. Successful exploitation allows the attacker to access the protected /api/runscript endpoint and execute arbitrary Node.js code on the server.

References

  • gist.github.com/lihy10/8cb2dd65ebf1385f12a7e00e25a50d40
  • github.com/advisories/GHSA-4r4r-4jp4-wwf9
  • github.com/frangoteam/FUXA
  • github.com/frangoteam/FUXA/blob/master/server/api/jwt-helper.js
  • nvd.nist.gov/vuln/detail/CVE-2025-69985

Code Behaviors & Features

Detect and mitigate CVE-2025-69985 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 1.2.8

Solution

Unfortunately, there is no solution available yet.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-288: Authentication Bypass Using an Alternate Path or Channel

Source file

npm/@frangoteam/fuxa/CVE-2025-69985.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 25 Mar 2026 00:16:48 +0000.