icon

We found results for “

CVE-2025-49141

Good to know:

icon
icon

Date: June 9, 2025

HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the "gitImportSite" functionality obtains a URL string from a POST request and insufficiently validates user input. The "set_remote" function later passes this input into "proc_open", yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the "filter_var" and "strpos" functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue.

Severity Score

Severity Score

Weakness Type (CWE)

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-78

Top Fix

icon

Upgrade Version

Upgrade to version @haxtheweb/haxcms-nodejs - 11.0.3;https://github.com/haxtheweb/haxcms-nodejs.git - v11.0.3

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): CHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

Do you need more information?

Contact Us