Cyber Posture

CVE-2026-4344

High

Published: 14 April 2026

Published
14 April 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
EPSS Score 0.0003 10.2th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-4344 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Autodesk Fusion. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 10.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Filters malicious HTML payloads in component names before displaying them in the delete confirmation dialog, directly preventing Stored XSS execution.

prevent

Validates and sanitizes inputs for component names to block malicious HTML payloads from being stored, preventing the root cause of the Stored XSS vulnerability.

prevent

Ensures timely remediation of the specific flaw through vendor patches provided in Autodesk security advisory ADSK-SA-2026-0005, eliminating the XSS vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Stored XSS in desktop client app directly enables T1203 (Exploitation for Client Execution) via arbitrary code execution in app context and T1005 (Data from Local System) via local file read capability.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A maliciously crafted HTML payload in a component name, when displayed during the delete confirmation dialog and clicked by a user, can trigger a Stored Cross-site Scripting (XSS) vulnerability in the Autodesk Fusion desktop application. A malicious actor may leverage…

more

this vulnerability to read local files or execute arbitrary code in the context of the current process.

Deeper analysisAI

CVE-2026-4344 is a Stored Cross-site Scripting (XSS) vulnerability, classified under CWE-79, affecting the Autodesk Fusion desktop application. The issue arises when a maliciously crafted HTML payload is embedded in a component name, which is then displayed in the delete confirmation dialog. If a user clicks on this dialog, the payload triggers the XSS, with a CVSS v3.1 base score of 7.1 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N).

An attacker with local access to the system can exploit this vulnerability without requiring privileges, though it demands low complexity and user interaction in the form of clicking the malicious dialog. Successful exploitation allows the attacker to read local files or execute arbitrary code within the context of the Autodesk Fusion desktop application process.

Autodesk has addressed the vulnerability in security advisory ADSK-SA-2026-0005, available at https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0005. Updated installers for mitigation are provided for macOS (https://dl.appstreaming.autodesk.com/production/installers/Fusion%20Client%20Downloader.dmg) and Windows (https://dl.appstreaming.autodesk.com/production/installers/Fusion%20Client%20Downloader.exe).

Details

CWE(s)

Affected Products

autodesk
fusion
≤ 2702.1.47

CVEs Like This One

CVE-2026-4345Same product: Autodesk Fusion
CVE-2026-4369Same product: Autodesk Fusion
CVE-2026-0534Same product: Autodesk Fusion
CVE-2026-0533Same product: Autodesk Fusion
CVE-2026-0535Same product: Autodesk Fusion
CVE-2026-0538Same vendor: Autodesk
CVE-2025-1430Same vendor: Autodesk
CVE-2025-1427Same vendor: Autodesk
CVE-2025-1650Same vendor: Autodesk
CVE-2026-0660Same vendor: Autodesk

References