CVE Alert: CVE-2025-49137

Vulnerability Summary: CVE-2025-49137
HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.0, the application does not sufficiently sanitize user input, allowing for the execution of arbitrary JavaScript code. The ‘saveNode’ and ‘saveManifest’ endpoints take user input and store it in the JSON schema for the site. This content is then rendered in the generated HAX site. Although the application does not allow users to supply a `script` tag, it does allow the use of other HTML tags to run JavaScript. Version 11.0.0 fixes the issue.
Affected Endpoints:
No affected endpoints listed.
Published Date:
6/9/2025, 9:15:46 PM
🔥 CVSS Score:
Exploit Status:
Not ExploitedReferences:
- https://github.com/haxtheweb/haxcms-php/commit/0dd3e98fe2fadd0793b667d4af2aac230980e0f8
- https://github.com/haxtheweb/issues/security/advisories/GHSA-2vc4-3hx7-v7v7
Recommended Action:
No proposed action available. Please refer to vendor documentation for updates.
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.