HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a POST request and insufficiently validates user input. The `set_remote` function later passes this input into `proc_open`, yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the `filter_var` and `strpos` functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Jun 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Haxtheweb
Haxtheweb haxcms-nodejs Haxtheweb haxcms-php |
|
CPEs | cpe:2.3:a:haxtheweb:haxcms-nodejs:*:*:*:*:*:node.js:*:* cpe:2.3:a:haxtheweb:haxcms-php:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Haxtheweb
Haxtheweb haxcms-nodejs Haxtheweb haxcms-php |
Tue, 10 Jun 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 09 Jun 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a POST request and insufficiently validates user input. The `set_remote` function later passes this input into `proc_open`, yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the `filter_var` and `strpos` functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue. | |
Title | HaxCMS-PHP Command Injection Vulnerability | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-06-09T21:11:08.889Z
Updated: 2025-06-10T15:29:29.971Z
Reserved: 2025-06-02T10:39:41.634Z
Link: CVE-2025-49141

Updated: 2025-06-10T14:21:47.499Z

Status : Analyzed
Published: 2025-06-09T21:15:47.360
Modified: 2025-06-20T13:43:48.103
Link: CVE-2025-49141

No data.