
We found results for “”
CVE-2025-49141
Good to know:


Date: June 9, 2025
HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the "gitImportSite" functionality obtains a URL string from a POST request and insufficiently validates user input. The "set_remote" function later passes this input into "proc_open", yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the "filter_var" and "strpos" functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE-78Top Fix

Upgrade Version
Upgrade to version @haxtheweb/haxcms-nodejs - 11.0.3;https://github.com/haxtheweb/haxcms-nodejs.git - v11.0.3
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | CHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |