CVE-2025-49141

HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a POST request and insufficiently validates user input. The `set_remote` function later passes this input into `proc_open`, yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the `filter_var` and `strpos` functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:psu:haxcms-nodejs:*:*:*:*:*:node.js:*:*
cpe:2.3:a:psu:haxcms-php:*:*:*:*:*:*:*:*

History

30 Jul 2025, 17:36

Type Values Removed Values Added
CPE cpe:2.3:a:haxtheweb:haxcms-nodejs:*:*:*:*:*:node.js:*:*
cpe:2.3:a:haxtheweb:haxcms-php:*:*:*:*:*:*:*:*
cpe:2.3:a:psu:haxcms-php:*:*:*:*:*:*:*:*
cpe:2.3:a:psu:haxcms-nodejs:*:*:*:*:*:node.js:*:*
First Time Psu haxcms-php
Psu
Psu haxcms-nodejs
References () https://github.com/haxtheweb/issues/security/advisories/GHSA-g4cf-pp4x-hqgw - Third Party Advisory, Exploit, Issue Tracking () https://github.com/haxtheweb/issues/security/advisories/GHSA-g4cf-pp4x-hqgw - Exploit, Issue Tracking, Third Party Advisory

20 Jun 2025, 13:43

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-09 21:15

Updated : 2025-07-30 17:36


NVD link : CVE-2025-49141

Mitre link : CVE-2025-49141

CVE.ORG link : CVE-2025-49141


JSON object : View

Products Affected

psu

  • haxcms-nodejs
  • haxcms-php
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')