CVE-2025-49137 PUBLISHED

Hax CMS Stored Cross-Site Scripting vulnerability

Assigner: GitHub_M
Reserved: 02.06.2025 Published: 09.06.2025 Updated: 10.06.2025

HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.0, the application does not sufficiently sanitize user input, allowing for the execution of arbitrary JavaScript code. The 'saveNode' and 'saveManifest' endpoints take user input and store it in the JSON schema for the site. This content is then rendered in the generated HAX site. Although the application does not allow users to supply a script tag, it does allow the use of other HTML tags to run JavaScript. Version 11.0.0 fixes the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N
CVSS Score: 8.5

Product Status

Vendor haxtheweb
Product issues
Versions
  • Version < 11.0.0 is affected

References

Problem Types

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE
  • CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) CWE
  • CWE-87: Improper Neutralization of Alternate XSS Syntax CWE