Vulnerability Description
A maliciously crafted HTML payload in a design name, when displayed during the delete confirmation dialog and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage this vulnerability to read local files or execute arbitrary code in the context of the current process.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Autodesk | Fusion | < 2606.1.21 |
Related Weaknesses (CWE)
References
- https://dl.appstreaming.autodesk.com/production/installers/Fusion%20Client%20DowProduct
- https://dl.appstreaming.autodesk.com/production/installers/Fusion%20Client%20DowProduct
- https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0001PatchVendor Advisory
FAQ
What is CVE-2026-0533?
CVE-2026-0533 is a vulnerability with a CVSS score of 7.1 (HIGH). A maliciously crafted HTML payload in a design name, when displayed during the delete confirmation dialog and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Au...
How severe is CVE-2026-0533?
CVE-2026-0533 has been rated HIGH with a CVSS base score of 7.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-0533?
Check the references section above for vendor advisories and patch information. Affected products include: Autodesk Fusion.