- Description
- HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a POST request and insufficiently validates user input. The `set_remote` function later passes this input into `proc_open`, yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the `filter_var` and `strpos` functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue.
- Source
- security-advisories@github.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security-advisories@github.com
- CWE-78
- Hype score
- Not currently trending
[CVE-2025-49141: HIGH] Vulnerability in HAX CMS PHP prior to version 11.0.3 allows OS command injection through improper input validation in the `gitImportSite` functionality. Update to the latest version fo...#cve,CVE-2025-49141,#cybersecurity https://t.co/FJH8NAnKzi https://t.c
@CveFindCom
9 Jun 2025
58 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-49141 HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a… https://t.co/FMDNM5koXk
@CVEnew
9 Jun 2025
398 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haxtheweb:haxcms-nodejs:*:*:*:*:*:node.js:*:*",
"vulnerable": true,
"matchCriteriaId": "599C99DD-2E74-45C2-B869-31A524911531",
"versionEndExcluding": "11.0.3"
},
{
"criteria": "cpe:2.3:a:haxtheweb:haxcms-php:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1A305A52-060B-44E0-A216-AB1ABA968828",
"versionEndExcluding": "11.0.0"
}
],
"operator": "OR"
}
]
}
]