CVE-2025-49141
Severity CVSS v4.0:
Pending analysis
Type:
CWE-78
OS Command Injections
Publication date:
09/06/2025
Last modified:
20/06/2025
Description
HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a POST request and insufficiently validates user input. The `set_remote` function later passes this input into `proc_open`, yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the `filter_var` and `strpos` functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue.
Impact
Base Score 3.x
8.50
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:haxtheweb:haxcms-nodejs:*:*:*:*:*:node.js:*:* | 11.0.3 (excluding) | |
cpe:2.3:a:haxtheweb:haxcms-php:*:*:*:*:*:*:*:* | 11.0.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page