HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a POST request and insufficiently validates user input. The `set_remote` function later passes this input into `proc_open`, yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the `filter_var` and `strpos` functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue.
References
| Link | Resource |
|---|---|
| https://github.com/haxtheweb/haxcms-nodejs/commit/5131fea6b6be611db76a618f89bd2e164752e9b3 | Patch |
| https://github.com/haxtheweb/issues/security/advisories/GHSA-g4cf-pp4x-hqgw | Exploit Issue Tracking Third Party Advisory |
| https://github.com/haxtheweb/issues/security/advisories/GHSA-g4cf-pp4x-hqgw | Exploit Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-06-09 21:15
Updated : 2025-07-30 17:36
NVD link : CVE-2025-49141
Mitre link : CVE-2025-49141
CVE.ORG link : CVE-2025-49141
JSON object : View
Products Affected
psu
- haxcms-nodejs
- haxcms-php
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
