CVE Alert: CVE-2025-10244 – Autodesk – Fusion

CVE-2025-10244

HIGHNo exploitation known

A maliciously crafted HTML payload, when rendered by the Autodesk Fusion desktop application, can trigger a Stored Cross-site Scripting (XSS) vulnerability. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process.

CVSS v3.1 (8.7)
AV NETWORK · AC LOW · PR LOW · UI REQUIRED · S CHANGED
Vendor
Autodesk
Product
Fusion
Versions
2602.1.25 lt 2604.1.25
CWE
CWE-79, CWE-79 Cross-Site Scripting (XSS) – Stored
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Published
2025-09-23T11:31:27.769Z
Updated
2025-09-23T11:31:27.769Z
cpe:2.3:a:autodesk:fusion:2602.1.25:*:*:*:*:*:*:*

AI Summary Analysis

Risk verdict

High risk: a stored XSS in Autodesk Fusion could allow reading local files or executing code in the current process after a user opens a crafted HTML payload; treat as priority 2 until a patch is deployed.

Why this matters

The vulnerability enables arbitrary code execution within Fusion’s process context and access to local data, potentially exfiltrating sensitive files. With lateral reach implied by a changed scope, impacts could extend beyond the application if the host shares sensitive resources or authentication state.

Most likely attack path

An attacker delivers a malicious HTML payload over network to a Fusion-equipped host; user action is required to render the content. Successful exploitation relies on the user opening the payload (low precondition) and Fusion rendering it, triggering stored XSS that can read files or execute code with user privileges. The attack leverages low privileges but changed scope can affect other components or data on the host.

Who is most exposed

Organizations deploying Autodesk Fusion desktop clients on Windows or macOS, including design studios and enterprise design workflows, are most at risk, especially where file sharing or remote collaboration streams are common.

Detection ideas

  • Unusual or unexpected HTML payload renders within Fusion logs.
  • Local file access patterns or reads initiated by Fusion during content rendering.
  • Process events showing script/code execution within Fusion’s process.
  • Anomalous network activity tied to Fusion clients delivering HTML/content.
  • Alert on tampering or unexpected HTML/JS payloads in Fusion-related temp/storage.

Mitigation and prioritisation

  • Apply vendor patch to move to non-affected versions; verify patch level and update cadence.
  • Enable strict content handling in Fusion or disable rendering of untrusted HTML where feasible.
  • Deploy endpoint detection controls to monitor Fusion process for code execution or unusual file I/O.
  • Enforce application allowlists and least privilege for Fusion execution context.
  • Change-management: test in staging, then rollout; communicate updated security baselines to users.

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.