CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-32028: HAX CMS PHP allows Insecure File Upload to Lead to Remote Code Execution

10.0 CVSS

Description

HAX CMS PHP allows you to manage your microsite universe with PHP backend. Multiple file upload functions within the HAX CMS PHP application call a ’save’ function in ’HAXCMSFile.php’. This save function uses a denylist to block specific file types from being uploaded to the server. This list is non-exhaustive and only blocks ’.php’, ’.sh’, ’.js’, and ’.css’ files. The existing logic causes the system to "fail open" rather than "fail closed." This vulnerability is fixed in 10.0.3.

Classification

CVE ID: CVE-2025-32028

CVSS Base Severity: CRITICAL

CVSS Base Score: 10.0

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem Types

CWE-434: Unrestricted Upload of File with Dangerous Type

Affected Products

Vendor: haxtheweb

Product: issues

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.05% (probability of being exploited)

EPSS Percentile: 14.49% (scored less or equal to compared to others)

EPSS Date: 2025-05-07 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-32028
https://github.com/haxtheweb/issues/security/advisories/GHSA-vj5q-3jv2-cg5p

Timeline