CVE-2026-35185 PUBLISHED

HAX CMS's public /server-status endpoint exposes authentication tokens, user activity, and client IP addresses

Assigner: GitHub_M
Reserved: 01.04.2026 Published: 06.04.2026 Updated: 07.04.2026

HAX CMS helps manage microsite universe with PHP or NodeJs backends. Prior to 25.0.0, the /server-status endpoint is publicly accessible and exposes sensitive information including authentication tokens (user_token), user activity, client IP addresses, and server configuration details. This allows any unauthenticated user to monitor real-time user interactions and gather internal infrastructure information. This vulnerability is fixed in 25.0.0.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
CVSS Score: 8.7

Product Status

Vendor haxtheweb
Product HAXiam
Versions
  • Version < 25.0.0 is affected

References

Problem Types

  • CWE-284: Improper Access Control CWE
  • CWE-522: Insufficiently Protected Credentials CWE
  • CWE-532: Insertion of Sensitive Information into Log File CWE