CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-49141: HaxCMS-PHP Command Injection Vulnerability

8.6 CVSS

Description

HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.3, the `gitImportSite` functionality obtains a URL string from a POST request and insufficiently validates user input. The `set_remote` function later passes this input into `proc_open`, yielding OS command injection. An authenticated attacker can craft a URL string that bypasses the validation checks employed by the `filter_var` and `strpos` functions in order to execute arbitrary OS commands on the backend server. The attacker can exfiltrate command output via an HTTP request. Version 11.0.3 contains a patch for the issue.

Classification

CVE ID: CVE-2025-49141

CVSS Base Severity: HIGH

CVSS Base Score: 8.6

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem Types

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Affected Products

Vendor: haxtheweb

Product: issues

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.22% (probability of being exploited)

EPSS Percentile: 44.36% (scored less or equal to compared to others)

EPSS Date: 2025-06-13 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-49141
https://github.com/haxtheweb/issues/security/advisories/GHSA-g4cf-pp4x-hqgw
https://github.com/haxtheweb/haxcms-nodejs/commit/5131fea6b6be611db76a618f89bd2e164752e9b3

Timeline