Description
HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a POST request and insufficiently validates user input. The `set_remote` function later passes this input into `proc_open`, yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the `filter_var` and `strpos` functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue.
Published: 2025-06-09
Score: 8.6 High
EPSS: 4.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-17578 HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a POST request and insufficiently validates user input. The `set_remote` function later passes this input into `proc_open`, yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the `filter_var` and `strpos` functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue.
Github GHSA Github GHSA GHSA-g4cf-pp4x-hqgw HaxCMS-PHP Command Injection Vulnerability
History

Wed, 30 Jul 2025 17:45:00 +0000

Type Values Removed Values Added
First Time appeared Psu
Psu haxcms-nodejs
Psu haxcms-php
CPEs cpe:2.3:a:haxtheweb:haxcms-nodejs:*:*:*:*:*:node.js:*:*
cpe:2.3:a:haxtheweb:haxcms-php:*:*:*:*:*:*:*:*
cpe:2.3:a:psu:haxcms-nodejs:*:*:*:*:*:node.js:*:*
cpe:2.3:a:psu:haxcms-php:*:*:*:*:*:*:*:*
Vendors & Products Haxtheweb
Haxtheweb haxcms-nodejs
Haxtheweb haxcms-php
Psu
Psu haxcms-nodejs
Psu haxcms-php

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00536}

epss

{'score': 0.00499}


Fri, 20 Jun 2025 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Haxtheweb
Haxtheweb haxcms-nodejs
Haxtheweb haxcms-php
CPEs cpe:2.3:a:haxtheweb:haxcms-nodejs:*:*:*:*:*:node.js:*:*
cpe:2.3:a:haxtheweb:haxcms-php:*:*:*:*:*:*:*:*
Vendors & Products Haxtheweb
Haxtheweb haxcms-nodejs
Haxtheweb haxcms-php

Tue, 10 Jun 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
Description HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a POST request and insufficiently validates user input. The `set_remote` function later passes this input into `proc_open`, yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the `filter_var` and `strpos` functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue.
Title HaxCMS-PHP Command Injection Vulnerability
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 8.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Psu Haxcms-nodejs Haxcms-php
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-06-10T15:29:29.971Z

Reserved: 2025-06-02T10:39:41.634Z

Link: CVE-2025-49141

cve-icon Vulnrichment

Updated: 2025-06-10T14:21:47.499Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-09T21:15:47.360

Modified: 2025-07-30T17:36:08.923

Link: CVE-2025-49141

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses