Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 16 Apr 2026 04:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Psu
Psu haxiam |
|
| CPEs | cpe:2.3:a:psu:haxiam:11.0.5:*:*:*:*:*:*:* | |
| Vendors & Products |
Psu
Psu haxiam |
|
| Metrics |
cvssV3_1
|
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 07 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Haxtheweb
Haxtheweb hax |
|
| Vendors & Products |
Haxtheweb
Haxtheweb hax |
Mon, 06 Apr 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HAX CMS helps manage microsite universe with PHP or NodeJs backends. Prior to 25.0.0, the /server-status endpoint is publicly accessible and exposes sensitive information including authentication tokens (user_token), user activity, client IP addresses, and server configuration details. This allows any unauthenticated user to monitor real-time user interactions and gather internal infrastructure information. This vulnerability is fixed in 25.0.0. | |
| Title | HAX CMS's public /server-status endpoint exposes authentication tokens, user activity, and client IP addresses | |
| Weaknesses | CWE-284 CWE-522 CWE-532 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-07T15:10:10.078Z
Reserved: 2026-04-01T17:26:21.134Z
Link: CVE-2026-35185
Updated: 2026-04-07T15:05:32.569Z
Status : Analyzed
Published: 2026-04-06T20:16:27.040
Modified: 2026-04-16T04:12:58.620
Link: CVE-2026-35185
No data.
OpenCVE Enrichment
Updated: 2026-04-07T09:37:27Z