HAXiam is a packaging wrapper for HAXcms which allows anyone to spawn their own microsite management platform. In versions 11.0.4 and below, the application returns a 200 response when requesting the data of a valid user and a 404 response when requesting the data of an invalid user. This can be used to infer the existence of valid user accounts. An authenticated attacker can use automated tooling to brute force potential usernames and use the application's response to identify valid accounts. This can be used in conjunction with other vulnerabilities, such as the lack of authorization checks, to enumerate and deface another user's sites. This is fixed in version 11.0.5.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Aug 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Psu
Psu haxiam |
|
CPEs | cpe:2.3:a:psu:haxiam:*:*:*:*:*:*:*:* | |
Vendors & Products |
Psu
Psu haxiam |
Wed, 23 Jul 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Haxtheweb
Haxtheweb hax |
|
Vendors & Products |
Haxtheweb
Haxtheweb hax |
Tue, 22 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 21 Jul 2025 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | HAXiam is a packaging wrapper for HAXcms which allows anyone to spawn their own microsite management platform. In versions 11.0.4 and below, the application returns a 200 response when requesting the data of a valid user and a 404 response when requesting the data of an invalid user. This can be used to infer the existence of valid user accounts. An authenticated attacker can use automated tooling to brute force potential usernames and use the application's response to identify valid accounts. This can be used in conjunction with other vulnerabilities, such as the lack of authorization checks, to enumerate and deface another user's sites. This is fixed in version 11.0.5. | |
Title | HAXiam allows for User Enumeration | |
Weaknesses | CWE-204 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-22T20:44:14.038Z
Reserved: 2025-07-16T23:53:40.509Z
Link: CVE-2025-54129

Updated: 2025-07-22T20:44:10.568Z

Status : Analyzed
Published: 2025-07-21T21:15:26.710
Modified: 2025-08-22T15:21:08.543
Link: CVE-2025-54129

No data.

Updated: 2025-07-23T17:36:07Z