Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-17563 | HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.0, in the HAX site editor, users can create a website block to load another site in an iframe. The application allows users to supply a target URL in the website block. When the HAX site is visited, the client's browser will query the supplied URL. An authenticated attacker can create a HAX site with a website block pointing at an attacker-controlled server running Responder or a similar tool. The attacker can then conduct a phishing attack by convincing another user to visit their malicious HAX site to harvest credentials. Version 11.0.0 contains a patch for the issue. |
Github GHSA |
GHSA-v3ph-2q5q-cg88 | @haxtheweb/haxcms-nodejs Iframe Phishing vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 30 Jul 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Psu
Psu haxcms-nodejs Psu haxcms-php |
|
| CPEs | cpe:2.3:a:haxtheweb:haxcms-php:*:*:*:*:*:*:*:* |
cpe:2.3:a:psu:haxcms-nodejs:*:*:*:*:*:node.js:*:* cpe:2.3:a:psu:haxcms-php:*:*:*:*:*:*:*:* |
| Vendors & Products |
Haxtheweb
Haxtheweb haxcms-nodejs Haxtheweb haxcms-php |
Psu
Psu haxcms-nodejs Psu haxcms-php |
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 20 Jun 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Haxtheweb
Haxtheweb haxcms-nodejs Haxtheweb haxcms-php |
|
| CPEs | cpe:2.3:a:haxtheweb:haxcms-nodejs:*:*:*:*:*:node.js:*:* cpe:2.3:a:haxtheweb:haxcms-php:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Haxtheweb
Haxtheweb haxcms-nodejs Haxtheweb haxcms-php |
Tue, 10 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | HAX CMS PHP allows users to manage their microsite universe with a PHP backend. Prior to version 11.0.0, in the HAX site editor, users can create a website block to load another site in an iframe. The application allows users to supply a target URL in the website block. When the HAX site is visited, the client's browser will query the supplied URL. An authenticated attacker can create a HAX site with a website block pointing at an attacker-controlled server running Responder or a similar tool. The attacker can then conduct a phishing attack by convincing another user to visit their malicious HAX site to harvest credentials. Version 11.0.0 contains a patch for the issue. | |
| Title | @haxtheweb/haxcms-nodejs Iframe Phishing vulnerability | |
| Weaknesses | CWE-1021 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-06-10T15:29:40.105Z
Reserved: 2025-06-02T10:39:41.634Z
Link: CVE-2025-49139
Updated: 2025-06-10T14:22:05.852Z
Status : Analyzed
Published: 2025-06-09T21:15:47.203
Modified: 2025-07-30T17:35:58.530
Link: CVE-2025-49139
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA