Description
FUXA 1.2.8 and prior contains an Authentication Bypass vulnerability leading to Remote Code Execution (RCE). The vulnerability exists in the server/api/jwt-helper.js middleware, which improperly trusts the HTTP “Referer” header to validate internal requests.
Recommendation
No fix is available yet. Followings are affected versions:
- <= 1.2.8
References
Related Issues
- Astro has an Authentication Bypass via Double URL Encoding, a bypass for CVE-2025-64765 - CVE-2025-66202
- webpack buildHttp HttpUriPlugin allowedUris bypass via HTTP redirects → SSRF + cache persistence - CVE-2025-68157
- Parse Server has a protected fields bypass via dot-notation in query and sort - CVE-2026-31872
- Parse Server has a rate limit bypass via batch request endpoint - CVE-2026-30972
- Tags:
- npm
- @frangoteam/fuxa
Anything's wrong? Let us know Last updated on February 26, 2026